cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6616
Views
70
Helpful
18
Replies

AIR-AP1852I-E-K9 won't connect to Virtual controller 8.2.166.0

Carl_perkins4
Level 1
Level 1

Hi, i'm trying to get 10 ap's to connect to a Virtual controller:

 

(Cisco Controller) >show sysinfo

Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.2.166.0
RTOS Version..................................... 8.2.166.0
Bootloader Version............................... 8.3.15.96
Emergency Image Version.......................... 8.2.166.0

Build Type....................................... DATA + WPS

System Name...................................... WLC01LSC
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
IP Address....................................... 10.164.125.11
IPv6 Address..................................... ::
System Up Time................................... 2 days 1 hrs 1 mins 43 secs
System Timezone Location......................... (GMT) London, Lisbon, Dublin, Edinburgh
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180

Configured Country............................... GB - United Kingdom

--More-- or (q)uit

State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 3
Number of Active Clients......................... 0

Burned-in MAC Address............................ 00:50:56:95:CD:72
Maximum number of APs supported.................. 200
System Nas-Id....................................
WLC MIC Certificate Types........................ SHA1
Licensing Type................................... RTU
vWLC config...................................... Small

(Cisco Controller) >

AP VER:

APA0F8.49E8.2C88>sh ver
Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html

This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

Cisco AP Software, (ap1g4), [wnbu-bld-lnx12:/local/build/JENKINS/workspace/8.2MR--More-- [*03/01/2018 10:27:17.0222] CAPWAP State: DTLS Teardown
[*03/01/2018 10:27:17.0322] Dropping dtls packet since session is not established. aa47d0b, 147e, aa47d4b, 1480, (nil)
5-corsica-CCO]
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Tue Mar 14 13:10:26 PDT 2017

ROM: Bootstrap program is U-Boot boot loader
BOOTLDR: U-Boot boot loader Version 25

APA0F8.49E8.2C88 uptime is 0 days, 2 hours, 07 minutes
Last reload time : Thu Mar 1 08:18:46 UTC 2018
Last reload reason : 1: reload command

cisco AIR-AP1852I-E-K9 ARMv7 Processor rev 0 (v7l) with 966404/745596K bytes of memory.
Processor board ID KWC213505IZ
AP Running Image : 8.2.151.0
Primary Boot Image : 8.2.151.0
Backup Boot Image : 0.0.0.0
2 Gigabit Ethernet interfaces
2 802.11 Radios
Radio FW version : ee27b5094d5b8602d2d973ea084d5cf4
NSS FW version : NSS.AK.1.0.c10-00017-E_custC-1.67978.1

Base ethernet MAC Address : A0:F8:49:E8:2C:88
Part Number : 0-0000-00
PCA Assembly Number : 074-13149-02
PCA Revision Number : 01
PCB Serial Number : KWC213505IZ
Top Assembly Part Number : 074-13149-02
Top Assembly Serial Number : KWC213505IZ
Top Revision Number : A0
Product/Model Number : AIR-AP1852I-E-K9


APA0F8.49E8.2C88>
APA0F8.49E8.2C88>[*03/01/2018 10:27:21.7707] CAPWAP State: Discovery
[*03/01/2018 10:27:21.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.8107] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.8107] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.8107] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:27:21.8207] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*03/01/2018 10:27:21.8207] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:27:32.0000] CAPWAP State: DTLS Setup
[*03/01/2018 10:27:32.1299] CAPWAP State: Join
[*03/01/2018 10:27:32.1299] Sending Join request to 10.164.125.11 through port 5248
[*03/01/2018 10:28:29.0322] CAPWAP State: DTLS Teardown
[*03/01/2018 10:28:29.0322] Dropping dtls packet since session is not established. aa47d0b, 147e, aa47d4b, 1480, (nil)
[*03/01/2018 10:28:33.7807] CAPWAP State: Discovery
[*03/01/2018 10:28:33.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.8207] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.8207] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.8207] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/01/2018 10:28:33.8307] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*03/01/2018 10:28:33.8307] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] Discovery Response from 10.164.125.11
[*03/01/2018 10:28:43.0000] CAPWAP State: DTLS Setup
[*03/01/2018 10:28:43.1299] CAPWAP State: Join
[*03/01/2018 10:28:43.1299] Sending Join request to 10.164.125.11 through port 5248

 

DHCP is working  ap is on same subnet as the manager

APA0F8.49E8.2C88>SH IP INT BRIEF
Interface IP-Address Method Status Protocol Speed
wired0 10.164.125.75 DHCP up up 1000
wired1 unassigned unset down up n/a
wifi0 unassigned unset administatively down down n/a
wifi1 unassigned unset administatively down down n/a
Controller is synced with time server:

(Cisco Controller) >show time

Time............................................. Thu Mar 1 10:31:33 2018

Timezone delta................................... 0:0
Timezone location................................ (GMT) London, Lisbon, Dublin, Edinburgh

NTP Servers
NTP Polling Interval......................... 3600

Index NTP Key Index NTP Server Status NTP Msg Auth Status
------- ----------------------------------------------------------------------------------------------
1 0 172.19.58.18 In Sync AUTH DISABLED
2 0 172.19.58.19 Not Tried AUTH DISABLED

18 Replies 18

Perfect! 3 years later

AP started downloading image

Hi, Leo

 

That's one of the first things i tried that i found on a previous blog of yours with someone else with the same issue:

APA0F8.49E8.2C88#show running-config
AP Name : APA0F8.49E8.2C88
Admin State : Enabled
AP Mode : Local
AP Submode : None
Location : default location
Reboot Reason : Invalid Config File
Primary controller name : WLC01LSC
Primary controller IP : 10.164.125.11
Secondary controller name :
Secondary controller IP : 10.164.125.11
Tertiary controller name :
Tertiary controller IP : 10.164.125.11
AP join priority : 1
Last Joined Controller name:
DTLS Encryption State : Disabled
Discovery Timer : 10
Heartbeat Timer : 30
CDP State : Enabled
Watchdog monitoring : Enabled
RRM State : Enabled
LSC State : Disabled
SSH State : Disabled
AP Username : Cisco
Session Timeout : 300
Syslog Host : 255.255.255.255
Syslog Facility : 0
Syslog Level : 0
Core Dump TFTP Ip Addr : 0.0.0.0
Core Dump Flag: : 0
Core Dump Filename :
WLC Link LAG status : Disabled
AP Link LAG status : Disabled

APA0F8.49E8.2C88#capwap ap primary-base WLC01LSC 10.164.125.11
APA0F8.49E8.2C88#
APA0F8.49E8.2C88#PING 10.164.125.11
Sending 5, 100-byte ICMP Echos to 10.164.125.11, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.656/1.355/1.718 ms
APA0F8.49E8.2C88#[*03/02/2018 07:25:00.0322] CAPWAP State: DTLS Teardown
[*03/02/2018 07:25:00.0322] Dropping dtls packet since session is not established. aa47d0b, 147e, aa47d4b, 1480, (nil)
[*03/02/2018 07:25:04.7807] CAPWAP State: Discovery
[*03/02/2018 07:25:04.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.8007] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.9706] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.9706] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:25:04.9706] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*03/02/2018 07:25:04.9706] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:25:14.0000] CAPWAP State: DTLS Setup
[*03/02/2018 07:25:14.8597] CAPWAP State: Join
[*03/02/2018 07:25:14.8597] Sending Join request to 10.164.125.11 through port 5248
[*03/02/2018 07:26:11.1821] CAPWAP State: DTLS Teardown
[*03/02/2018 07:26:11.1821] Dropping dtls packet since session is not established. aa47d0b, 147e, aa47d4b, 1480, (nil)
[*03/02/2018 07:26:13.1715] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4).
[*03/02/2018 07:26:13.1815] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4).
[*03/02/2018 07:26:15.7707] CAPWAP State: Discovery
[*03/02/2018 07:26:15.7707] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.7807] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.7907] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.9506] Discovery Request sent to 10.164.125.11, discovery type STATIC_CONFIG(1)
[*03/02/2018 07:26:15.9606] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*03/02/2018 07:26:15.9606] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] Discovery Response from 10.164.125.11
[*03/02/2018 07:26:26.0000] CAPWAP State: DTLS Setup
[*03/02/2018 07:26:26.8697] CAPWAP State: Join
[*03/02/2018 07:26:26.8697] Sending Join request to 10.164.125.11 through port 5248

 

In the mean time i've also upgraded the controller code to version 8.3.140.0 but this has not changed anything.

 

Kind Regards,

Carl

Last idea I have, under Security -> AP Policies, do you have enabled Accept Manufactured Installed Certificate (MIC)?

Should be enabled by default. I don't think it's that though.




Hi, 

 

Yes that's enabled

AP-Policy.JPG

 

 

 

 

 

 

 

Regards,

Carl

Review Cisco Networking for a $25 gift card