cancelar
Mostrar resultados para 
Pesquisar em vez de 
Queria dizer: 
cancel
2173
Apresentações
0
Útil
23
Respostas

9800-CL Controller and AIR-AP3802

rdrigues
Level 1
Level 1

I'm trying to run AIR-AP3802-Z-K9(Version 9.0.5.5)  on the 9800-CL controller version 17.3.3 and it won't run:

Does anyone know what it could be?


CAPWAP State: Discovery
Discovery Request sent to 10.141.0.250, discovery type STATIC_CONFIG(1)
IP DNS query for CISCO-CAPWAP-CONTROLLER
DNS resolved CISCO-CAPWAP-CONTROLLER
DNS discover IP addr: 10.141.0.250
Discovery Request sent to 10.141.0.250, discovery type STATIC_CONFIG(1)
Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
Discovery Response from 10.141.0.250
CAPWAP State: DTLS Setup
First connect to vWLC, accept vWLC by default
CAPWAP State: Join
Sending Join request to 10.141.0.250 through port 5264
Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Join(5).

23 RESPOSTAS 23

You must to

Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**

Won't it affect the other aps?

Hi @rdrigues 

Well, I'm not sure because I never try it before, but in that case you can delete the command if you see any issue.

There's is another way to do it, but I did in 9800-LC

crypto pki certificate map map1 1
 issuer-name co Cisco Manufacturing CA
crypto pki trustpool policy
match certificate map1 allow expired-certificate

This command will ignore the certificates on 9800 controller.

The last idea that you can try id delete the AP flash, and upload the image that the AP need to join. Checking your 9800-CL version 17.3.3, you'll ned 15.3(3)JPJ6 on your AP.  I used this workaround with 5520 controller and 3600 APs and it worked really well

Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**

Hi @rdrigues 

Then try this 

capwap ap erase all

 

Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**

same problem:

rdrigues_0-1701802370331.png

 

balaji.bandi
Hall of Fame
Hall of Fame

check the compatabil matrix AP and WLC :

https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html

what Code AP running, and post complete boot AP console from power on to end failed join.

AP should have correct image to join WLC ?

what kind of Join process option 43 , broadcast ?

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

rdrigues_0-1701181726843.png

 

Can you share the complete boot process of the AP, please

Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**

BootROM - 1.78

Booting from SPI flash, Secure mode

BootROM: RSA Public key verification PASSED

BootROM: CSK block signature verification PASSED

BootROM: Boot header signature verification PASSED

BootROM: Box ID verification PASSED

BootROM: JTAG is disabled

 

General initialization - Version: 1.0.0

Detected Device ID 6920

Master bootloder version 1.40

High speed PHY - Version: 2.0

BoardId = 0x20board SerDes lanes topology details:

| Lane # | Speed| Type |

------------------------------|

| 1 | 0 | SGMII1 |

| 2 | 5 | PCIe1 |

| 4 | 5 | PCIe2 |

| 5 | 0 | SGMII2 |

-------------------------------

:** Link is Gen1, check the EP capability

PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities

:** Link is Gen1, check the EP capability

PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities

High speed PHY - Ended Successfully

DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0

DDR4 Training Sequence - Switching XBAR Window to FastPath Window

DDR4 Training Sequence - Ended Successfully

BootROM: Image checksum verification PASSED

BootROM: Boot image signature verification PASSED

__ _
/ _|() __ _ _
| | | |/ _| / _|/ _ \
| |_ | |\_ \| (| () |
\_||||_/ \_|\_/
_ _ __ _
| | | | | _ ) __ _ | |_
| | | |_| _ \ / _ \ / _ \| __|
| || |_| |) | () | () | |_
\_/ |_/ \_/ \_/ \_|
* LOADER *


U-Boot 2013.01-gcb01933d4 (Nov 10 2020 - 23:41:12) SDK version: 2015_T2.0p10

Board: Barbados-3K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected N25Q32A with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae360
BSS: 0x3ffefe24
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | In-Band |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 3  2  1  0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 6278405 (0x005fcd05)...
Done
SF: Detected N25Q32A with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2021-07-24 1:38:32 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 6277397 Bytes = 6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4202616 Bytes = 4 MiB
Image 1: 2058628 Bytes = 2 MiB
Image 2: 16137 Bytes = 15.8 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x025f8a4c
Loading Multi-File Image ... OK
OK
reserving fdt memory region: addr=0 size=4000
Loading Device Tree to 01ff9000, end 01ffff08 ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1025864K/1048576K available (5743K kernel code, 411K rwdata, 2476K rodata, 359K init, 496K bss, 22712K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:01.4300] buginf tty flushing thread started, ttyport=baa0c000
[01/01/1970 00:00:01.5500] m25p80 spi1.0: found n25q032a, expected n25q032
[*01/01/1970 00:00:02.6572] buginf() enabled.

[*01/01/1970 00:00:02.6668] Made it into bootsh: Jul 24 2021 01:27:06 T-0a2b596ef15bf752e1997e120fccc6443e72bb8b-g0a2b596e-aut

[*01/01/1970 00:00:10.4188] bootsh mini ramfs booted /bootpart/part1/ramfs_data_cisco.cpio.lzma


Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.


This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.

[*01/01/1970 00:00:32.4557] /init: ioctl(SIOCGIFHWADDR): wired0: No such device

[*01/01/1970 00:00:32.4588] /init: ioctl(SIOCGIFHWADDR): wired0: No such device

[*01/01/1970 00:00:32.4973] /init: ioctl(SIOCGIFHWADDR): wired0: No such device

[*01/01/1970 00:00:32.5004] /init: ioctl(SIOCGIFHWADDR): wired0: No such device

Created slice -.slice.
Reached target Cisco File Systems (Pre).
Listening on udev Control Socket.
Listening on Delayed Shutdown Socket.
Reached target Timers.
Created slice system.slice.
Created slice system-serial\x2dgetty.slice.
Reached target Slices.
Listening on udev Kernel Socket.
Starting udev Coldplug all Devices...
Starting udev Kernel Device Manager...
Starting Cisco UBIFS reformat/mount...
Reached target Sockets.
Started udev Kernel Device Manager.
Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
Started Cisco early mount.
Reached target Local File Systems (Pre).
Starting Cisco system time setup...
Starting Cisco seed generation...
Starting Cisco platform file generation...
[*07/06/2017 23:59:59.0701] Last reload time: Nov 28 17:36:24 2023

[*11/28/2023 17:36:24.0034] Setting system time Tue Nov 28 17:36:24 UTC 2023

Starting Cisco fips check...
Started Cisco system time setup.
Started Cisco seed generation.
Started Cisco fips check.
Started udev Coldplug all Devices.
Started Cisco platform file generation.
Starting Cisco btldr service...
Started Cisco btldr service.
Reached target Local File Systems.
Starting Cisco act2 check...
[*11/28/2023 17:36:25.5652] GCM-128 POST passed

[*11/28/2023 17:36:25.5653] G Starting Cisco pkg install service...
Starting Cisco S10 boot service...
Starting Security Auditing Service...
[*11/28/2023 17:36:27.2127] parameter passed without an option given

Started Cisco system time saving.
[*11/28/2023 17:36:27.3193] Identified Ethernet mGig PHY: aq

Starting Cisco system time saving...
Started Security Auditing Service.
Started Cisco pkg install service.
[*11/28/2023 17:36:29.4199]

[*11/28/2023 17:36:29.4200]

[*11/28/2023 17:36:29.4200]

[*11/28/2023 Started Cisco act2 check.
[[0m[31m* [0m] A start job is running for Cisco S10 boot service (18s / 1min 35s)
[K[[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (19s / 1min 35s)
[K[[31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (19s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (20s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (20s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m*[0m] A start job is running for Cisco S10 boot service (21s / 1min 35s)
[K[ [31m*[1;31m*[0m] A start job is running for Cisco S10 boot service (21s / 1min 35s)
[K[ [31m*[0m] A start job is running for Cisco S10 boot service (22s / 1min 35s)
[K[ [31m*[1;31m*[0m] A start job is running for Cisco S10 boot service (22s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m*[0m] A start job is running for Cisco S10 boot service (23s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (23s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (24s / 1min 35s)[11/28/2023 17:36:45.6000] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
[11/28/2023 17:36:45.6800] PCI: enabling device 0000:02:00.0 (0140 -> 0142)

[K[[31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (24s / 1min 35s)
[K[[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (25s / 1min 35s)
[K[[0m[31m* [0m] A start job is running for Cisco S10 boot service (25s / 1min 35s)
[K[[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (26s / 1min 35s)
[K[[31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (26s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (27s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (27s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m*[0m] A start job is running for Cisco S10 boot service (28s / 1min 35s)
[K[ [31m*[1;31m*[0m] A start job is running for Cisco S10 boot service (28s / 1min 35s)
[K[ [31m*[0m] A start job is running for Cisco S10 boot service (29s / 1min 35s)
[K[ [31m*[1;31m*[0m] A start job is running for Cisco S10 boot service (29s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m*[0m] A start job is running for Cisco S10 boot service (30s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (30s / 1min 35s)[*11/28/2023 17:36:45.1475] [11/28/2023 17:36:52.0200] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
Active version: [11/28/2023 17:36:52.1200] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
8.10.162.0

[*11/28/2023 17:36:45.1502] Backup version: 8.10.151.0

[*11/28/2023 17:36:45.3894] device wired0 entered promiscuous mode

[*11/28/2023 17:36:45.7759] wifi0: Initializing TX ring

[*11/28/2023 17:36:45.7793] wifi0: Initializing RX ring

[*11/28/2023 17:36:45.7838] wifi0: prepare firmware downloading

[*11/28/2023 17:36:46.6030] wifi0: Firmware downloading

[*11/28/2023 17:36:47.8234] 0;0;0;0;0;0;0;0;

[*11/28/2023 17:36:51.5855] Firmware download complete

[*11/28/2023 17:36:51.7755] wifi0: Getting HW specs. Retrying for 3

[*11/28/2023 17:36:51.7758] Mac_Init

[*11/28/2023 17:36:51.7762] Preparing to set HW specs

[*11/28/2023 17:36:51.7764] FIPS enc aes-ccmp Verified

[*11/28/2023 17:36:51.7766] FIPS dec aes-ccmp Verified

[*11/28/2023 17:36:51.7767] FIPS enc aes-ccmp-256 Verified

[*11/28/2023 17:36:51.7768] FIPS dec aes-ccmp-256 Verified

[*11/28/2023 17:36:51.7769] FIPS enc aes-gcmp Verified

[*11/28/2023 17:36:51.7770] FIPS dec aes-gcmp Verified

[*11/28/2023 17:36:51.7771] FIPS enc aes-gcmp-256 Verified

[*11/28/2023 17:36:51.7772] FIPS dec aes-gcmp-256 Verified

[*11/28/2023 17:36:52.2247] wifi1: Initializing TX ring

[*11/28/2023 17:36:52.2282] wifi1: Initializing RX ring

[*11/28/2023 17:36:52.2327] wifi1: prepare firmware downloading

[*11/28/2023 17:36:53.0514] wifi1: Firmware downloading


[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (33s / 1min 35s)[*11/28/2023 17:36:54.2715] 0;
[K[[31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (33s / 1min 35s)
[K[[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (34s / 1min 35s)
[K[[0m[31m* [0m] A start job is running for Cisco S10 boot service (34s / 1min 35s)
[K[[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (35s / 1min 35s)
[K[[31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (35s / 1min 35s)
[K[ [31m*[1;31m*[0m[31m* [0m] A start job is running for Cisco S10 boot service (36s / 1min 35s)0;0;0;0;0;0;

[*11/28/2023 17:36:57.4755] Firmware download complete

[*11/28/2023 17:36:57.6755] wifi1: Getting HW specs. Retrying for 3

[*11/28/2023 17:36:57.6758] Mac_Init

[*11/28/2023 17:36:57.6761] Preparing to set HW specs

[*11/28/2023 17:36:57.6764] FIPS enc aes-ccmp Verified

[*11/28/2023 17:36:57.6765] FIPS dec aes-ccmp Verified

[*11/28/2023 17:36:57.6766] FIPS enc aes-ccmp-256 Verified

[*11/28/2023 17:36:57.6767] FIPS dec aes-ccmp-256 Verified

[*11/28/2023 17:36:57.6768] FIPS enc aes-gcmp Verified

[*11/28/2023 17:36:57.6769] FIPS dec aes-gcmp Verified

[*11/28/2023 17:36:57.6770] FIPS enc aes-gcmp-256 Verified

[*11/28/2023 17:36:57.6771] FIPS dec aes-gcmp-256 Verified

[*11/28/2023 17:36:58.7497] Last reload reason : 1: reload command


[K Started Cisco S10 boot service.
Starting Cisco watchdog...
Starting Cisco nss service...
[*11/28/2023 17:37:01.0507] Initializing NSS Firmware

Starting Cisco nolan service...
Started Cisco watchdog.
Started Cisco nolan service.
Starting Cisco nolan USB service...
Started Cisco nolan USB service.
Started Cisco pre-PoE negotiation.
Starting Cisco pre-PoE negotiation...
Started Cisco nss service.
Starting Cisco S15platform...
Starting Cisco Kclick...
[11/28/2023 17:37:04.6300] Disabling lock debugging due to kernel taint
Started Cisco S15platform.
Started Cisco Kclick.
Starting Cisco certificate create service...
Starting Cisco Sku service...
[*11/28/2023 17:37:04.8415] stile module dp init successfully

[*11/28/2023 17:37:04.8415] NB Starting Cisco ME service...
Starting Cisco Kclick...
Started Cisco Sku service.
Started Cisco ME service.
Started Cisco certificate create service.
Starting Cisco certtime service...
[*11/28/2023 17:37:08.0388] Create symlink /dev/mic_cert result 0

[*11/28/2023 17:37:08.0388] Loading certificates from storage...

[*11/28/2023 17:37:08.0753] barbados /tmp/SC4_1dbm.txt

Started Cisco Tam service.
Starting Cisco Tam service...
Started Cisco Kclick.
Starting rsyslog client...
Starting Cisco S16platfomm...
Starting Cisco syslog service...
Started rsyslog client.
Started Cisco S16platfomm.
Started Cisco syslog service.
Starting Cisco synclogd...
Started Cisco synclogd.
Started Cisco certtime service.
Reached target System Initialization.
Reached target Paths.
Reached target Basic System.
[*11/28/2023 17:37:13.6997] starting tam services using ACT2...

[*11/28/2023 17:37:13.6997]

[ Starting Cisco klogd...
Starting Cisco led service...
Starting WCPD process...
Starting Cisco image/firmware updater service...
Starting gRPC server daemon...
Starting Cisco rtd service...
Starting Hostapd process...
Starting Cisco brain service...
Starting Cisco kexec...
Starting OpenSSH server daemon...
Starting AP Trace daemon...
Started System Monitor service.
Starting System Monitor service...
Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
Reached target Login Prompts.
Starting Fast CGI daemon...
Starting Cisco printkd...
Starting Clean Air daemon...
Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting capwapd...
Starting Marvell Forwarding daemon...
Started Cisco led service.
Started Cisco image/firmware updater service.
Started Cisco kexec.
Started Cisco klogd.
Started Cisco printkd.
Started Cisco rtd service.
Started AP Trace daemon.
Started Fast CGI daemon.
Started Hostapd process.
Started Cisco brain service.
Started OpenSSH server daemon.
[11/28/2023 17:37:17.4600] wired0 emac 0: link up
[11/28/2023 17:37:17.5100] wired0: link up