cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
595
Views
0
Helpful
2
Replies

1852E Mobility Express AP can not join ifself

id404
Spotlight
Spotlight

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] waiting for WCP to initialize

[*12/14/2022 06:23:05.5811] Socket Invalid Element wcp/wcp_db Handler has_rlan Data 0 Length 10

[*12/14/2022 06:23:05.5811] Failed to load flex AP config from file. Default config will be used.

[*12/14/2022 06:23:05.5811] /usr/sbin/capwapd: opening /click/cli_h/apr_bypass/active failed!: No such file or directory

[*12/14/2022 06:23:05.5811]

[*12/14/2022 06:23:05.5811] !!!!! {/usr/sbin/capwapd} failed writing /click/cli_h/apr_bypass/active len 1 data: "1"

[*12/14/2022 06:23:05.5811] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_outdoor Data 0 Length 25

[*12/14/2022 06:23:05.6711] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_I_domain Data 0 Length 25

[*12/14/2022 06:23:05.8610] /usr/bin/cisco_core.sh: Corefile /storage/cores//AP501C.B024.06D0__core-wcpd.8.5.161.0.2022-12-14-05-36-13.tgz deleted.


U-Boot 2012.07 (btldr release 41) (Jan 05 2021 - 13:03:00)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM: 1 GiB
NAND (ONFI): Detected SPANSION S34MS02G1 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:0], write_counter=29
PCI0 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3af POE or Others detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 5  4  3  2  1  0
Specified BOOT: part1

Booting from part1

Read 1024 bytes from volume part1 to 45000000
Read 44552564 bytes from volume part1 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment

Starting image ...

[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M console=ttyHSL1,9600n8 activepart=part1 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:00.2200]
[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
[01/01/1970 00:00:28.2313] ACPU PVS: 0
[01/01/1970 00:00:30.6606] buginf tty flushing thread started, ttyport=ef528e90
[*01/01/1970 00:00:36.8586] buginf() enabled.

[*01/01/1970 00:00:36.8686] Made it into bootsh: Feb 18 2020 05:03:39

[*01/01/1970 00:00:36.8686] bootsh build T-eaf8c9a5819ff90fa88df9b4045e20adf0d0a259-geaf8c9a5-vipendya

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.


This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.

[*01/01/1970 00:00:38.8880]
init started: BusyBox v1.23.2 (2020-02-18 04:38:33 PST)

[*01/01/1970 00:00:40.1976] GCM-128 POST passed

[*01/01/1970 00:00:40.1976] GCM-256 POST passed

[*01/01/1970 00:00:40.3276] === 5G radio domain is 51, COPY 5G BDF files from non_ETSI_BDF folder ===

[*01/01/1970 00:00:40.3775] 4

[*01/01/1970 00:00:40.5775] Active version: 8.5.161.0

[*01/01/1970 00:00:40.5775] Backup version: 0.0.0.0

Jan 1 00:00:40 FIPS[1624]: *** shell: FIPS Mode = disabled ***

 

User Access Verification
Username: [*01/01/1970 00:00:40.7874]

[*01/01/1970 00:00:40.7874] led pattern module start

[*01/01/1970 00:00:40.8374] AP1852I

[*01/01/1970 00:00:40.9374] nss_driver - Turbo Support 1

[*01/01/1970 00:00:40.9374] Supported Frequencies - 110Mhz 550Mhz 733Mhz

[*01/01/1970 00:00:40.9774] NSS firmware booted

[*01/01/1970 00:00:41.0074] NSS firmware booted

[*01/01/1970 00:00:41.0873]

[*01/01/1970 00:00:41.0873] phy_value=0: org="0x1000" phy_reg="0x1800"

[*01/01/1970 00:00:41.4472] Current value of FACTORY_RESET=0

[*01/01/1970 00:00:41.4672] Last reload time: Dec 14 06:21:33 2022

[*12/14/2022 06:21:33.0000] Setting system time Wed Dec 14 06:21:33 UTC 2022

[*12/14/2022 06:21:33.0699] device wired0 entered promiscuous mode

[*12/14/2022 06:21:33.1499] device wired1 entered promiscuous mode

[*12/14/2022 06:21:33.5798] stile module dp init successfully

[*12/14/2022 06:21:33.5798] NBAR Label:BLD_V155_3_S_XE316_THROTTLE_LATEST_20180404_162221 NBAR VERSION:module build date: Feb 18 2020 at 05:00:59

[*12/14/2022 06:21:34.2696] miibus get eecb4000!

[*12/14/2022 06:21:34.3096]

[*12/14/2022 06:21:34.3196] boot 25 build T-eaf8c9a5819ff90fa88df9b4045e20adf0d0a259-geaf8c9a5-vipendya board corsica mac 50:1C:B0:24:06:D0

[*12/14/2022 06:21:34.3196] Module: mbedtls .text=0xbf000000 data=0xbf007e18 bss=0xbf008070

[*12/14/2022 06:21:34.3196] Module: aptrace .text=0xbf00c000 data=0xbf018834 bss=0xbf018cc0

[*12/14/2022 06:21:34.3196] Module: led_module .text=0xbf020000 data=0xbf0204e0 bss=0xbf020b48

[*12/14/2022 06:21:34.3196] Module: qca_nss_gmac .text=0xbf024000 data=0xbf02abc4 bss=0xbf02b088

[*12/14/2022 06:21:34.3196] Module: qca_nss_drv .text=0xbf034000 data=0xbf04f9e8 bss=0xbf050798

[*12/14/2022 06:21:34.3196] Module: qca_nss_capwapmgr .text=0xbf071000 data=0xbf075acc bss=0xbf075c20

[*12/14/2022 06:21:34.3196] Module: nssmgrctl .text=0xbf07c000 data=0xbf07d728 bss=0xbf07da4c

[*12/14/2022 06:21:34.3196] Module: proclikefs .text=0xbf083000 data= bss=0xbf083b40

[*12/14/2022 06:21:34.3196] Module: stile_lm_ft .text= data= bss=

[*12/14/2022 06:21:34.3196] Module: stile_lm_dp .text= data= bss=

[*12/14/2022 06:21:34.3196] Module: ipv6 .text=0xbfa12000 data=0xbfa42f40 bss=0xbfa447ec

[*12/14/2022 06:21:34.3196] Module: bonding .text=0xbfa5e000 data=0xbfa6f62c bss=0xbfa6fa58

[*12/14/2022 06:21:34.3196] Module: lowmemorykiller .text=0xbfa7c000 data=0xbfa7c2c0 bss=0xbfa7c44c

[*12/14/2022 06:21:34.3196] Module: qca_nss_profile_drv .text=0xbfa80000 data=0xbfa81320 bss=0xbfa81494

[*12/14/2022 06:21:34.3196] Module: scsi_wait_scan .text= data= bss=

[*12/14/2022 06:21:34.3196] Module: ssdk_reg .text=0xbfa8a000 data= bss=0xbfa8a838

[*12/14/2022 06:21:34.7694] Last reload reason : 0: unknown

[*12/14/2022 06:21:36.3689] __mm_init_module

[*12/14/2022 06:21:36.4189]

[*12/14/2022 06:21:36.4189] __ol_ath_attach() Allocated scn ed1c0480

[*12/14/2022 06:21:36.4289] ol_ath_attach interface_id 0

[*12/14/2022 06:21:36.4289] Chip id: 0x9, chip version: 0x1000000

[*12/14/2022 06:21:36.4289]

[*12/14/2022 06:21:36.4289] Target Version is 1000000

[*12/14/2022 06:21:36.4289]

[*12/14/2022 06:21:36.4289] Flash Download Address c0000

[*12/14/2022 06:21:36.4289] ol_transfer_bin_file: flash data file defined

[*12/14/2022 06:21:36.4289] Cal location [0]: 00000000

[*12/14/2022 06:21:36.4289]

[*12/14/2022 06:21:36.4289] Wifi0 NAND FLASH Select OFFSET 0x1000

[*12/14/2022 06:21:36.4489] qc98xx_verify_checksum: flash checksum passed: 0x6e76

[*12/14/2022 06:21:36.4489] ol_transfer_bin_file 3979: Download Flash data len 12064

[*12/14/2022 06:21:36.4689]

[*12/14/2022 06:21:36.4689] Board data initialized

[*12/14/2022 06:21:36.5189] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660

[*12/14/2022 06:21:36.5189] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1

[*12/14/2022 06:21:36.5189] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin

[*12/14/2022 06:21:36.5989]

[*12/14/2022 06:21:36.5989] [Flash] : Ignore Module param

[*12/14/2022 06:21:36.5989] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0

[*12/14/2022 06:21:36.6189] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin

[*12/14/2022 06:21:37.7185] HTC Rx: insufficient length, got:4 expected =8

[*12/14/2022 06:21:37.7285] Startup Mode-0 set

[*12/14/2022 06:21:37.7285] HTC Service:0x0300 ep:1 TX flow control disabled

[*12/14/2022 06:21:37.7285] HTC Service:0x0100 ep:2 TX flow control disabled

[*12/14/2022 06:21:37.7285] Firmware_Build_Number:70

[*12/14/2022 06:21:37.7285] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffaa

[*12/14/2022 06:21:37.7285]

[*12/14/2022 06:21:37.7285] RES CFG Support wmi_service_bitmap 9778

[*12/14/2022 06:21:37.7285]

[*12/14/2022 06:21:37.7285] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT

[*12/14/2022 06:21:37.7285] ol_ath_service_ready_event: sw_cal_support_check_flag: 1

[*12/14/2022 06:21:37.7985] wmi_ready_event_rx: WMI UNIFIED READY event

[*12/14/2022 06:21:37.7985] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0

[*12/14/2022 06:21:37.8085] ACS not enabled

[*12/14/2022 06:21:37.8085] ol_ath_thermal_mitigation_attach: --

[*12/14/2022 06:21:37.8485] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16

[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )

[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )

[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )

[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )

[*12/14/2022 06:21:40.9075] click-config/io-real.click:131: While configuring 'todev_wired0 :: ToDevice':

[*12/14/2022 06:21:40.9075] warning: device 'wired0' is down

[*12/14/2022 06:21:40.9475] click-config/io-real.click:131: While configuring 'fromdev_wired0 :: FromDevice':

[*12/14/2022 06:21:40.9475] warning: device 'wired0' is down

[*12/14/2022 06:21:40.9975] pid 2486's current affinity mask: 3

[*12/14/2022 06:21:40.9975] pid 2486's new affinity mask: 1

[*12/14/2022 06:21:42.1571] click-config/io-real.click:131: While initializing 'tohost_wired0 :: ToHost':

[*12/14/2022 06:21:42.1571] warning: device 'wired0' is down

[*12/14/2022 06:21:43.5367]

[*12/14/2022 06:21:43.5367] Click sched monitor: schedulers = 1

[*12/14/2022 06:21:44.0865] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000

[*12/14/2022 06:21:46.0159] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down

[*12/14/2022 06:21:46.0359] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up

[*12/14/2022 06:21:46.0359] ip6_port srcr6, ip6local fe80::521c:b0ff:fe24:6d0, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 3(slaac)

[*12/14/2022 06:21:47.4355] wired0: 1000 Mbps Full Duplex

[*12/14/2022 06:21:47.4355]

[*12/14/2022 06:21:56.1128] Loading sha2...

[*12/14/2022 06:21:56.1128] Dumpping sha1...

[*12/14/2022 06:21:57.7623] Loading MIC cert and key

[*12/14/2022 06:21:57.7623] Dumpping sha2...

[*12/14/2022 06:21:59.4018] Loading MIC cert and key

[*12/14/2022 06:21:59.7817] Generating key, this may take a while...

[*12/14/2022 06:22:01.7411] Public key portion is:

[*12/14/2022 06:22:01.7411] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGEol6lHAb+Cwk9eEBDa+lDc6mwHj3hY4aVLQkyWpqtItTY3LZ6++11Vnh/D5ka+GRyrS3fxKtwOinYkEfKXg3LrP4vBlNAIqtH+J/U4Rzt7LCIwpunBz3xYJ9nyM0LrUJPMIN1c52x+6V6B+Eym1dJBqH/aNGN94QHZJt9Y0AKfhXCm3Rt4uOZg30gqC/8fAIIT+D53WIB+fYD2JzLhzP8t7Ky7Ou7mux2sT93PkrEQuRC4F6c96/SolCvqPYB+ILzCBcDcRdTyxkSdJHElE1TbL7SczWziOHwZNZd/wuSL6HOaPwhgUvSocs2LzSZ3lLOWmbDyrXyF7+9UPaFC7J root@m501CB02406D0

[*12/14/2022 06:22:01.7411] Fingerprint: sha1!! 23:8e:53:75:40:88:af:1b:69:85:ba:60:e5:06:03:a1:64:dc:8b:38

[*12/14/2022 06:22:01.7910] pid 3706's current affinity mask: 3

[*12/14/2022 06:22:01.7910] pid 3706's new affinity mask: 1

[*12/14/2022 06:22:02.2709] Password for user changed

[*12/14/2022 06:22:02.3709] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/1/g' -e 's/__DOMAIN_5G__/51/g' -e 's/__PWR_TABLE_49G__/0/g' -e 's/__PRODUCT_ID__/AIR-AP1852E-H-K9/g' -e 's/__AP_TYPE__/47/g' -e 's/__WIRELESS_MAC__/50:1C:B0:24:81:A0/g' -e 's/__WIRED_MAC__/50:1C:B0:24:06:D0/g' -e 's/__WIRED1_MAC__/50:1C:B0:24:06:D0/g' | DMALLOC_OPTIONS=debug=0x400003,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &

[*12/14/2022 06:22:03.7204] DOT11_DRV[0]: Init Radio0

[*12/14/2022 06:22:03.7404] DOT11_DRV[0]: Stop Radio0

[*12/14/2022 06:22:03.7504] DOT11_DRV[0]: set_channel Channel set to 6

[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX failed for apr1v0 error No such device

[*12/14/2022 06:22:03.7504] wcpd: /local/BUILD/workspace/85MR6_ME_CCO/corsica/router/base/../elts-meraki/elements/wcp/wcp_db.cc: 1513: void WcpDb::populate_if_index_table(): Assertion `if_index >= 0 && if_index < 64' failed.

[*12/14/2022 06:22:12.6976] ethernet_port wired0, ip 192.168.0.137, netmask 255.255.255.0, gw 192.168.0.253, mtu 1500, bcast 192.168.0.255, dns1 202.96.128.86, dns2 202.96.128.166, vid 0, static_ip_failover false, dhcp_vlan_failover false

[*12/14/2022 06:22:17.8960] AP IPv4 Address updated from 0.0.0.0 to 192.168.0.137

[*12/14/2022 06:22:38.4396]

[*12/14/2022 06:22:38.4396] !!!!! {watchdogd} Process wcpd gone for 60s

[*12/14/2022 06:22:38.4396]

[*12/14/2022 06:22:38.4396] !!!!! {watchdogd} Process capwapd no heartbeat for 60s

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] waiting for WCP to initialize

[*12/14/2022 06:23:02.4821] Socket Invalid Element wcp/wcp_db Handler has_rlan Data 0 Length 10

[*12/14/2022 06:23:02.4821] Failed to load flex AP config from file. Default config will be used.

[*12/14/2022 06:23:02.4821] /usr/sbin/capwapd: opening /click/cli_h/apr_bypass/active failed!: No such file or directory

[*12/14/2022 06:23:02.4821]

[*12/14/2022 06:23:02.4821] !!!!! {/usr/sbin/capwapd} failed writing /click/cli_h/apr_bypass/active len 1 data: "1"

[*12/14/2022 06:23:02.4821] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_outdoor Data 0 Length 25

[*12/14/2022 06:23:02.5721] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_I_domain Data 0 Length 25

[*12/14/2022 06:23:02.7620] /usr/bin/cisco_core.sh: Corefile /storage/cores//AP501C.B024.06D0__core-wcpd.8.5.161.0.2022-12-14-05-36-16.tgz deleted.

[*12/14/2022 06:23:17.4674]

[*12/14/2022 06:23:17.4674] phy_value=0: org="0x1800" phy_reg="0x1800"

[*12/14/2022 06:23:43.4993]

[*12/14/2022 06:23:43.4993] !!!!! {watchdogd} Process wcpd gone for 120s

Username: cisco
Password:
AP501C.B024.06D0>en
Password:
AP501C.B024.06D0#show ver
AP501C.B024.06D0#show version
Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
--More-- [*12/14/2022 06:24:48.5489]

[*12/14/2022 06:24:48.5489] !!!!! {watchdogd} Process wcpd gone for 180s

[*12/14/2022 06:24:53.0975] chatter: tohost_virtual :: ToHost: device 'virtual' went down

[*12/14/2022 06:24:53.0975] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down

[*12/14/2022 06:24:53.1075] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down

[*12/14/2022 06:24:53.1075] chatter: tohost_vlan2 :: ToHost: device 'vlan2' went down

[*12/14/2022 06:24:53.1175] chat
Cryptographic library self-test....
Testing SHA1 Short Message 1
Testing SHA256 Short Message 1
Testing SHA384 Short Message 1
SHA1 POST PASSED
Testing HMAC SHA1 Short Message 1
Testing HMAC SHA2 Short Message 1
Testing HMAC SHA384 Short Message 1
passed!

XML config selected
/bin/sh: /usr/bin/iptables: not found
/bin/sh: /usr/bin/iptables: not found
Starting SSHD: ok
Validating XML configuration
Cisco is a trademark of Cisco Systems, Inc.
Software Copyright Cisco Systems, Inc. All rights reserved.

Cisco AireOS Version 8.5.161.0
Initializing OS Services: ok
Initializing Serial Services: ok
Initializing Network Services: ok
Starting Statistics Service: ok
Starting ARP Services: ok
Starting Trap Manager: ok
Starting Network Interface Management Services: ok
Starting System Services: ok
Starting SNMP services: ok
Starting Fastpath Hardware Acceleration: Starting Switching Services: ok
Starting QoS Services: ok
Starting Policy Manager: ok
Starting Data Transport Link Layer: ok
Starting Access Control List Services: ok
Starting System Interfaces:
As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled
As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled
ok
Starting Client Troubleshooting Service: ok
Starting Certificate Database: Initializing Curl Globally..
ok
Starting VPN Services: ok
Starting Management Frame Protection: ok
Starting DNS Services: ok
ok
Starting LWAPP: ok
Starting CAPWAP: ok
Starting LOCP: ok
Starting Security Services: ok
Starting Policy Manager: ok
Starting Authentication Engine: ok
Starting Mobility Management: ok
Starting Capwap Ping Component: ok
Starting AVC Services: ok
Starting AVC Flex Services: ok
Starting Virtual AP Services: ok
Starting AireWave Director: ok
Starting Network Time Services: ok
Starting Cisco Discovery Protocol: ok
Starting Broadcast Services: ok
Starting Logging Services: ok
Starting DHCP Server: ok
Starting IDS Signature Manager: ok
Starting RFID Tag Tracking: ok
Starting RF Profiles: ok
Starting Mesh Services: ok
Starting TSM: ok
Starting CIDS Services: ok
Starting Ethernet-over-IP: ok
Starting DTLS server: enabled in CAPWAP
Starting CleanAir: ok
Starting WIPS: ok
Starting SSHPM LSC PROV LIST: ok
Starting RRC Services: ok
Starting SXP Services: ok
Starting Alarm Services: ok
Starting FMC HS: ok
Starting FLEXEXPRESS ConfigSync Task: ok
Starting Hotspot Services: ok
Starting HTTP Image Download Task: ok
Starting Tunnel Services New: ok
Starting Portal Server Services: ok
Starting Management Services:
Web Server: CLI: Secure Web: ok
Starting IPSec Profiles component: ok
Starting CPU ACL Logging services: ok

(Cisco Controller)

Enter User Name (or 'Recover-Config' this one-time only to reset configuration to factory defaults)

User: admin
Password:**********
Warning: Missing TFTP/CCO params, Please Configure the Image Download Params

Welcome to the Cisco Mobility Express command line interface.
Only commands which are listed in the command reference guide for this release are supported.
http://www.cisco.com/c/en/us/support/wireless/mobility-express/products-command-reference-list.html
(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >debug capwap ap  ?

detail Configures debug of CAPWAP detail
dtls-keepalive Configures debug of CAPWAP Data DTLS keep alive packets
errors Configures debug of CAPWAP errors
events Configures debug of CAPWAP events and state
hexdump Configures debug of CAPWAP payloads
info Configures debug of CAPWAP info
packet Configures debug of CAPWAP packet
payload Configures debug of CAPWAP payloads

aggregation Configures debug of CAPWAP aggregation events

(Cisco Controller) >debug capwap detail enable

(Cisco Controller) >debug ca?
cac call-control capwap calea
(Cisco Controller) >debug capwap events *spamApTask0: Dec 14 14:30:16.559: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 WTP already released
enable

(Cisco Controller) >debug capwap ?

detail Configures debug of CAPWAP detail
dtls-keepalive Configures debug of CAPWAP Data DTLS keep alive packets
errors Configures debug of CAPWAP errors
events Configures debug of CAPWAP events and state
hexdump Configures debug of CAPWAP payloads
info Configures debug of CAPWAP info
packet Configures debug of CAPWAP packet
payload Configures debug of CAPWAP payloads

aggregation Configures debug of CAPWAP aggregation events

(Cisco Controller) >debug capwap info enable

(Cisco Controller) >*capwapSocketTask: Dec 14 14:30:26.062: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:30:26.062: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:30:26.063: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:30:26.063: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 WTP already released

(Cisco Controller) >debug ap ?

aid Configures debug of client AID messages.
client-trace Debug command for AP Client Trace
command Remote execute a command on Cisco AP.
disable Disable remote debugging of Cisco AP.
enable Enable remote debugging of Cisco AP.
packet-dump Debug command for AP Packet capture
radar-logs Debug command for AP Radar log collection
show Display debug ap show commands.

(Cisco Controller) >debug ap *capwapSocketTask: Dec 14 14:30:35.569: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:30:35.569: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:30:35.570: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:30:35.570: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 WTP already released
enable

Incorrect input! Use 'debug ap enable <Cisco AP>'

(Cisco Controller) >debug ap enable                 debug ap enable      ?

aid Configures debug of client AID messages.
client-trace Debug command for AP Client Trace
command Remote execute a command on Cisco AP.
disable Disable remote debugging of Cisco AP.
enable Enable remote debugging of Cisco AP.
packet-dump Debug command for AP Packet capture
radar-logs Debug command for AP Radar log collection
show Display debug ap show commands.

(Cisco Controller) >debug ap *capwapSocketTask: Dec 14 14:30:45.071: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:30:45.072: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:30:45.073: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:30:45.073: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:30:54.576: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:30:54.576: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:30:54.578: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:30:54.578: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:04.079: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:04.079: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:04.080: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:04.080: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:04.081: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:04.081: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:13.584: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:13.585: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:13.586: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:13.586: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:23.089: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:23.089: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:23.090: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:23.090: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:32.593: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:32.593: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:32.595: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:32.595: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:42.098: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:42.099: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:42.100: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:42.100: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:31:51.602: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:31:51.602: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:31:51.603: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:31:51.603: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:31:51.604: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:31:51.604: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:01.108: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:01.108: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:01.109: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:01.109: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:10.612: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:10.612: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:10.613: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:10.613: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:20.116: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:20.116: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:20.116: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:20.118: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:20.118: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:29.619: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:29.620: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:29.621: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:29.621: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:39.124: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:39.125: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:39.126: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:39.126: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:48.629: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:48.629: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:48.630: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:48.630: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:32:58.134: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:32:58.134: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:58.134: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:32:58.134: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:32:58.136: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:32:58.136: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:07.636: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:07.637: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:07.638: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:07.638: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:17.144: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:17.145: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:17.146: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:17.146: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:26.648: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:26.648: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:26.649: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:26.649: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:36.152: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:36.152: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:36.152: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:36.154: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:36.154: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:45.655: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:45.655: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:45.655: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:45.657: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:45.657: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:33:55.160: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:33:55.161: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:33:55.162: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:33:55.162: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:04.664: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:04.664: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:04.664: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:04.666: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:04.666: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:14.169: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:14.169: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:14.170: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:14.171: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:14.171: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:14.171: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:23.674: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:23.674: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:23.675: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:23.675: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:33.177: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:33.178: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:33.179: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:33.179: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:42.683: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:42.683: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:42.684: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:42.684: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:34:52.184: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:34:52.185: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:34:52.186: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:34:52.186: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 WTP already released
*capwapSocketTask: Dec 14 14:35:01.689: Recieved CAPWAP Packet from=192.168.0.137:5264
*spamApTask0: Dec 14 14:35:01.689: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0
*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 1. 0 0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 2. 232 3

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 3. 0 0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 4. 50 0

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 apType = 77 apModel:

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 msgLength = 36

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 acName = wlc

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66

*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904

*spamApTask0: Dec 14 14:35:01.691: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141

*spamApTask0: Dec 14 14:35:01.691: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264

*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 WTP already released


Writing reload timestamp (Wed Dec 14 06:35:09 UTC 2022) to disk

 

[12/14/2022 06:35:11.8957] UBIFS: un-mount UBI device 0, volume 3
[12/14/2022 06:35:12.7555] Restarting system.
[12/14/2022 06:35:12.7955] Going down for restart now


U-Boot 2012.07 (btldr release 41) (Jan 05 2021 - 13:03:00)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM: 1 GiB
NAND (ONFI): Detected SPANSION S34MS02G1 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:0], write_counter=29
PCI0 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3af POE or Others detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 5  4  3  2  1  0
Specified BOOT: part1

1 Accepted Solution

Accepted Solutions

Rich R
VIP
VIP

[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX failed for apr1v0 error No such device

I think you have a faulty AP - RMA required.

The other clue to that is "Discovery request: Total msgEleLen = 0" and "Unknown AP type"

View solution in original post

2 Replies 2

id404
Spotlight
Spotlight


AP501C.B024.06D0>show version
Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html

This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.

Cisco AP Software, (ap1g4), C1852, RELEASE SOFTWARE
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Tue Feb 18 05:04:04 PST 2020

ROM: Bootstrap program is U-Boot boot loader
BOOTLDR: U-Boot boot loader Version 41

AP501C.B024.06D0 uptime is 0 days, 0 hours, 2 minutes
Last reload time : Wed Dec 14 06:35:09 UTC 2022
Last reload reason : watchdog reset(wcpd)

cisco AIR-AP1852E-H-K9 ARMv7 Processor rev 0 (v7l) with 997268/731060K bytes of memory.
Processor board ID KWC2149041J
AP Running Image : 8.5.161.0
Primary Boot Image : 8.5.161.0
Backup Boot Image : 0.0.0.0
AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : MOBILITY EXPRESS CAPABLE
2 Gigabit Ethernet interfaces
1 802.11 Radios
Radio FW version : 64035bf3490c0cb9e24ce9b09a56fe6c
NSS FW version : NSS.AK.C.CS-3-fix3

Base ethernet MAC Address : 50:1C:B0:24:06:D0
Part Number : 0-0000-00
PCA Assembly Number : 074-13150-02
PCA Revision Number : 01
PCB Serial Number : KWC2149041J
Top Assembly Part Number : 074-13150-02
Top Assembly Serial Number : KWC2149041J
Top Revision Number : A0
Product/Model Number : AIR-AP1852E-H-K9

 

 

(Cisco Controller) >show sysinfo

Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.5.161.0

System Name...................................... wlc
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.2250
IP Address....................................... 192.168.0.141
Last Reset....................................... 12: watchdog reset(wcpd)

System Up Time................................... 0 days 0 hrs 0 mins 30 secs
System Timezone Location......................... (GMT +8:00) HongKong, Bejing, Chongquing
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180

Configured Country............................... Multiple Countries : BA,BH,CN,US

State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 1

--More-- or (q)uit
Number of Active Clients......................... 0

OUI Classification Failure Count................. 0

Memory Current Usage............................. 0
Memory Average Usage............................. 0
CPU Current Usage................................ 0
CPU Average Usage................................ 0

Flash Type....................................... Compact Flash Card
Flash Size....................................... 1073741824

Burned-in MAC Address............................ 50:1C:B0:24:06:C0
Maximum number of APs supported.................. 50
System Nas-Id....................................
WLC MIC Certificate Types........................ SHA1/SHA2

Rich R
VIP
VIP

[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX failed for apr1v0 error No such device

I think you have a faulty AP - RMA required.

The other clue to that is "Discovery request: Total msgEleLen = 0" and "Unknown AP type"

Review Cisco Networking products for a $25 gift card