07-14-2022 03:05 AM
Hi Cisco Community.
I have an issue with AP AIR-CAP1532I-E-K9 with image LW ap1g3-k9w8-tar.153-3.JK7.tar.
It's not able to join WLC.
My WLC is:
NAME: "Chassis" , DESCR: "Cisco 5500 Series Wireless LAN Controller"
PID: AIR-CT5508-K9, VID: V03
The version of the IOS is:
Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.0.152.0
Bootloader Version............................... 1.0.1
Field Recovery Image Version..................... 6.0.182.0
Firmware Version................................. FPGA 1.7, Env 1.8, USB console 2.2
Build Type....................................... DATA + WPS
System Name...................................... WC1
System Location.................................. Location 2, R1
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
Redundancy Mode.................................. Disabled
IP Address....................................... 192.168.1.99
IPv6 Address..................................... ::
Last Reset....................................... Software reset
System Up Time................................... 481 days 22 hrs 55 mins 38 secs
System Timezone Location......................... (GMT +2:00) Jerusalem
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180
Configured Country............................... BG - Bulgaria
--More-- or (q)uit
Operating Environment............................ Commercial (0 to 40 C)
Internal Temp Alarm Limits....................... 0 to 65 C
Internal Temperature............................. +38 C
External Temperature............................. +23 C
Fan Status....................................... OK
State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 7
Number of Active Clients......................... 126
Burned-in MAC Address............................ E2:C7:24:AA:79:80
Power Supply 1................................... Present, OK
Power Supply 2................................... Absent
Maximum number of APs supported.................. 500
System Nas-Id....................................
WLC MIC Certificate Types........................ SHA1
The error logs on the AP are:
Jul 14 07:22:03.471: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
*Jul 14 07:22:08.471: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
*Jul 14 07:22:08.471: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.99
*Jul 14 07:22:08.471: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
*Jul 14 07:22:08.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
*Jul 14 07:22:08.475: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
Do you have any idea what is the reason for this error?
Thank you in advance.
Best Regards.
Solved! Go to Solution.
07-14-2022 06:07 AM
15.3(3)JK7 is the very latest 8.10.171.0 CAPWAP AP software which includes CAPWAP protocol changes for compatibility with the latest 9800 software versions.
The WLC is running 8.0.152.0 which is very old. I suggest you manually downgrade the AP to 15.3(3)JA12 (for 8.0.152.0 AireOS) then try to join it. I suspect the new CAPWAP protocol standard simply won't work with 8.0.152.0.
https://software.cisco.com/download/home/284620606/type/280775090/release/15.3.3-JA12
07-14-2022 03:15 AM
can you share show auth-list output from controller.
I hope you have enough license ?
07-14-2022 03:42 AM - edited 07-14-2022 03:51 AM
Hi,
On the first WLC this is the output:
Authorize MIC APs against Auth-list or AAA ...... disabled
Authorize LSC APs against Auth-List ............. disabled
APs Allowed to Join
AP with Manufacturing Installed Certificate.... yes
AP with Self-Signed Certificate................ yes
AP with Locally Significant Certificate........ yes
Mac Addr Cert Type Key Hash
----------------------- ---------- ----------------------------------------- -
54:75:d0:11:50:2a MIC
54:75:d0:4a:76:3e MIC
78:da:6e:59:ae:c8 MIC
On the Second WLC:
Authorize MIC APs against Auth-list or AAA ...... disabled
Authorize LSC APs against Auth-List ............. disabled
APs Allowed to Join
AP with Manufacturing Installed Certificate.... yes
AP with Self-Signed Certificate................ yes
AP with Locally Significant Certificate........ no
Mac Addr Cert Type Key Hash
----------------------- ---------- ------------------------------------------
00:1c:58:34:20:34 MIC
18:9c:5d:70:50:30 LSC
54:75:d0:11:50:2a MIC
54:75:d0:4a:76:3e MIC
78:da:6e:59:ad:08 LSC
The mac address of my AP is 78:da:6e:59:ad:08 on his LAN interface.
The mac address of the Wireless interface is18:9c:5d:70:50:30.
The errors on the WLC are:
capwap_ac_sm.c:4551 Error decoding Join request from AP 18:9c:5d:70:50:30
*spamApTask0: Jul 14 13:43:51.563: %CAPWAP-3-DECODE_ERR:
07-14-2022 05:07 AM
Since you have authorization for mic and Lcs disabled, all that mac doesn’t matter here, go to security>Under AAA in the left frame, click MAC Filtering>All new>Enter the Ethernet MAC address of the access point in the MAC Address field ( for wlan select any wlan).
07-14-2022 04:09 AM
On the AP, post the complete output to the command "sh capwap client rcb".
07-14-2022 04:15 AM
Hi Leo,
Thank you for your attention regarding the topic.
This is the output:
AP78da.6e59.ad08#sh capwap client rcb
AdminState : ADMIN_ENABLED
Primary SwVer : 8.10.171.0
Backup SwVer : 0.0.0.0
NumFilledSlots : 2
Name : AP78da.6e59.ad08
Location : default location
MwarName : WLC1
MwarApMgrIp : 192.168.1.99
MwarHwVer : 0.0.0.0
ApMode : Local
ApSubMode : Not Configured
OperationState : JOIN
CAPWAP Path MTU : 576
Link-Encryption (AP) : Disabled
Link-Encryption (MWAR) : Disabled
Prefer-mode : Un-configured
LinkAuditing : disabled
AP Rogue Detection Mode : Enabled
AP Tcp MSS Adjust : Disabled
Predownload Status : None
Auto Immune Status : Disabled
RA Guard Status : Disabled
Efficient Upgrade State : Disabled
Efficient Upgrade Role : None
Antenna Band Mode : Unknown
Universal AP Priming mode : Unprimed
802.11bg(0) Radio
ADMIN State = ENABLE [1]
OPER State = DOWN [1]
CONFIG State = UP [2]
HW State = UP [4]
Radio Mode : Local
GPR Period : 0
Beacon Period : 0
DTIM Period : 0
World Mode : 1
VoceraFix : 0
Dfs peakdetect : 1
Fragmentation Threshold : 0
Current Tx Power Level : 0
Current Channel : 13
Current Bandwidth : 20
802.11a(1) Radio
ADMIN State = ENABLE [1]
OPER State = DOWN [1]
CONFIG State = UP [2]
HW State = UP [4]
Radio Mode : Local
GPR Period : 0
Beacon Period : 0
DTIM Period : 0
World Mode : 1
VoceraFix : 0
Dfs peakdetect : 1
*Jul 14 11:12:09.463: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
*Jul 14 11:12:09.463: %DTLS-5-ALERT: Received WARNING : Close notify alert from
Fragmentation Threshold : 0
Current Tx Power Level : 0
Current Channel : 140
Current Bandwidth : 20
07-14-2022 04:24 AM
@tanner.zaitt wrote:
ApMode : Local
Local mode. So no need to enter the MAC address into Local MAC Filtering.
Please share the output to the command "show ap join stats detailed <AP MAC>"?
07-14-2022 04:30 AM
Okay,
This is the output:
For LAN mac address of the AP:
(Cisco Controller) >show ap join stats detailed 78:da:6e:59:ad:08
No join information found for AP: 78:da:6e:59:ad:08
For Wireless mac address of the AP the output is:
(Cisco Controller) >show ap join stats detailed 18:9c:5d:70:50:30
Sync phase statistics
- Time at sync request received............................ Not applicable
- Time at sync completed................................... Not applicable
Discovery phase statistics
- Discovery requests received.............................. 16
- Successful discovery responses sent...................... 16
- Unsuccessful discovery request processing................ 0
- Reason for last unsuccessful discovery attempt........... Not applicable
- Time at last successful discovery attempt................ Jul 14 14:27:56.014
- Time at last unsuccessful discovery attempt.............. Not applicable
Join phase statistics
- Join requests received................................... 12
- Successful join responses sent........................... 0
- Unsuccessful join request processing..................... 12
- Reason for last unsuccessful join attempt................ Join message decode Maximum message size Failed
- Time at last successful join attempt..................... Not applicable
- Time at last unsuccessful join attempt................... Jul 14 14:27:20.518
Configuration phase statistics
--More-- or (q)uit
- Configuration requests received.......................... 0
- Successful configuration responses sent.................. 0
- Unsuccessful configuration request processing............ 0
- Reason for last unsuccessful configuration attempt....... Not applicable
- Time at last successful configuration attempt............ Not applicable
- Time at last unsuccessful configuration attempt.......... Not applicable
Last AP message decryption failure details
- Reason for last message decryption failure............... Not applicable
Last AP disconnect details
- Reason for last AP connection failure.................... Not applicable
- Last AP disconnect reason................................ Not applicable
Last join error summary
- Type of error that occurred last......................... Lwapp join request rejected
- Reason for error that occurred last...................... Join message decode Maximum message size Failed
- Time at which the last join error occurred............... Jul 14 14:27:20.518
AP disconnect details
- Reason for last AP connection failure.................... Not applicable
Ethernet Mac : 18:9c:5d:70:50:30 Ip Address : 192.168.1.19
07-14-2022 04:50 AM - edited 07-14-2022 04:51 AM
Console into the AP and reboot the AP.
Post the entire bootup process into a text file and attach it.
From the WLC, post the output to the command "sh time".
07-14-2022 05:07 AM
- Check these remarks too : https://community.cisco.com/t5/wireless/air-cap1532i-e-k9-unable-to-join-wlc5508/m-p/2396724#M90742
M.
07-14-2022 12:43 PM
Hi, thank you, I did it but didn't help.
07-14-2022 05:18 AM
The time output of the WLC:
(Cisco Controller) >show time
Time............................................. Thu Jul 14 15:07:23 2022
Timezone delta................................... 0:0
Timezone location................................ (GMT +2:00) Jerusalem
NTP Servers
NTP Polling Interval......................... 86400
Index NTP Key Index NTP Server NTP Msg Auth Status
------- ----------------------------------------------------------------------------------
1 0 192.168.12.10 AUTH DISABLED
2 0 192.168.12.10 AUTH DISABLED
The output from bootup:
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2022.07.14 15:05:19 =~=~=~=~=~=~=~=~=~=~=~=
*Jul 14 12:05:19.447: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.100
*Jul 14 12:05:19.447: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.100
*Jul 14 12:05:19.447: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.100:5246
AP78da.6e59.ad08#relo
AP78da.6e59.ad08#reload
Proceed with reload? [confirm]
Writing out the event log to flash:/event.log ...
*Jul 14 12:05:24.567: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to the reason code 11
*Jul 14 12:05:24.567: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to the reason code 11
*Jul 14 12:05:24.575: %SYS-5-RELOAD: Reload requested by cisco on console. Reload Reason: Reload.
*Jul 14 12:05:24.575: %LWAPP-5-CHANGED: CAPWAP changed state to DOWN
Write of event.log done
Not in Bound state.
*Jul 14 12:05:29.467: %CAPWAP-3-DHCP_RENEW: Could not discover WLC. Either IP address is not assigned or assigned IP is wrong. Renewing DHCP IP.
System Bootstrap, Version U-Boot 1.1.4-gf5ee82b1-dirty Corfu , RELEASE SOFTWARE
Build Date: Oct 17 2013 - 18:08:55
corfu - Scorpion 1.0
DRAM: 256 MB
Now running in RAM - U-Boot at: 8ffbc000
Flash Manuf Id 0xc2, DeviceId0 0x20, DeviceId1 0x14
flash size 1MB, sector count = 256
Atheros on-chip NAND FLash Controller Driver, Version 0.1 (c) 2010 Atheros Communications, Ltd.
Ath Nand ID[8ffee17c]: 2c:f1:80:95:02
ONFI MICRON MT29F1G08ABADAWP
Micron NAND 128MiB 3,3V 8-bit [128MB]
size = 128MB
Hit any key to stop autoboot: 5 4 3 2 1 0
boot_method is set to IOS_BOOT, boot IOS bootloader in NOR flash
Loading .text @ 0x84000000 (207840 bytes)
Loading .rodata @ 0x84032be0 (39008 bytes)
Loading .data @ 0x8403c440 (3264 bytes)
Loading .data.rel.local @ 0x8403d100 (1084 bytes)
Loading .data.rel @ 0x8403d53c (124 bytes)
Loading .data.rel.ro @ 0x8403d5b8 (960 bytes)
Clearing .bss @ 0x8403d980 (161116 bytes)
Clearing .scommon @ 0x84064edc (56 bytes)
## Starting application at 0x84000000 ...
IOS Secondary Bootloader - Starting system.HW Test Status(0)
Ath Nand ID: 95:80:f1:2c:00
Using driver version 1 for media type 2
Valid buffers 315
total315 315
success found all blocks
start end 16 74
found in range
high low end 2384 515 74
Xmodem file system is available.
mifs[0]: 24 files, 5 directories
mifs[0]: Total bytes : 131334144
mifs[0]: Bytes used : 16533504
mifs[0]: Bytes available : 114800640
mifs[0]: mifs fsck took 0 seconds.
Base Ethernet MAC address: 78:da:6e:59:ad:08
Setup MAC....
Waiting for PHY auto negotiation to complete...Port 0 Negogiation success.
Ethernet speed is 1000 Mb - FULL duplex
Scorpion ----> F1 PHY *
: cfg1 0xf cfg2 0x7215
Loading "flash:/ap1g3-k9w8-mx.153-3.JK7/ap1g3-k9w8-mx.153-3.JK7"...##############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
File "flash:/ap1g3-k9w8-mx.153-3.JK7/ap1g3-k9w8-mx.153-3.JK7" uncompressed and installed, entry point: 0x60080000
executing...
Stop MAC.
Starting IOS...
cp0 timer begin value is set as 1000
prid= 19750
Starts main.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1530 Software (ap1g3-K9W8-M), Version 15.3(3)JK7, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2022 by Cisco Systems, Inc.
Compiled Sat 26-Feb-22 07:36 by mcpre
Initializing flashfs...
Ath Nand ID: 95:80:F1:2C:00
Using driver version 1 for media type 2
Valid buffers 315
total315 315
success found all blocks
start end 16 74
found in range
high low end 2384 515 74
mifs[3]: 24 files, 5 directories
mifs[3]: Total bytes : 131334144
mifs[3]: Bytes used : 16533504
mifs[3]: Bytes available : 114800640
mifs[3]: mifs fsck took 5 seconds.
mifs[3]: Initialization complete.
...done Initializing flashfs.
:pci_init_board:521 *** Warning *** : PCIe1 WLAN Module not found !!!
pci_rc2_init_board:570 PCIE Controller Init Bus Master Enable
:pci_rc2_init_board:593 PCIe2 WLAN Module Found !!!
soap_pci_subsys_init:706 Bus Master/Mem Enable on pci_write side
soap_pci_subsys_init(713): PCI vendor ID: 0x168C ret:0
soap_pci_subsys_init(715): PCI device ID: 0x33 ret:0
Scorpion ----> F1 PHY *
Waiting for PHY auto negotiation to complete...Port 0 Negogiation success.
Disabling 802.3az feature on port 0
sgmii cal value = 0xE
Disabling 802.3az feature on port 1.
SGMII setup done, status is 0x1
Radio0 present 9550 9000 0 0 0 0
Rate table has 282 entries (12 legacy/96 11n/174 11ac)
Radio1 present 9590 9000 0 0 B2000000 1
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco AIR-CAP1532I-E-K9 (MIPS74k) processor (revision 24) with 204800K/57344K bytes of memory.
Processor board ID FCZ1752H01T
MIPS74k CPU at 700Mhz, revision number 0x0000
Last reset from power-on
LWAPP image version 8.10.171.0
2 Gigabit Ethernet interfaces
2 802.11 Radios
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: 78:DA:6E:59:AD:08
Part Number : 74-11942-01
PCB Serial Number : FOC174549GR
Top Assembly Part Number : 000-00000-00
Top Assembly Serial Number : FCZ1752H01T
Top Revision Number : 23
Product/Model Number : AIR-CAP1532I-E-K9
% Please define a domain-name first.
Press RETURN to get started!
*Mar 1 00:00:19.583: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed (15)mips74k_config_radio_pci(302): PCI CMD write: 0x356
*Mar 1 00:00:25.159: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to upEnterprise mode: 0x44000000
*Mar 1 00:00:25.659: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0 (2)
*Mar 1 00:00:25.735: ath_load_ctl_pwr_tbl() dot11radio 2G loading CTL binary flash:/ap1g3-k9w8-mx.153-3.JK7/CO2.bin version# 7.6
*Mar 1 00:00:26.239: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1 (2)
*Mar 1 00:00:26.239: ath_load_ctl_pwr_tbl() dot11radio 5G loading CTL binary flash:/ap1g3-k9w8-mx.153-3.JK7/CO5.bin version# 1.2
*Mar 1 00:00:27.159: %LINK-6-UPDOWN: Interface GigabitEthernet1, changed state to up
*Mar 1 00:00:29.647: CDP_PD: Power Source: 2-pair Power Injector
APAVC Registering AVC licences on the AP to make sure we enable advanced PP
*Mar 1 00:00:31.855: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar 1 00:00:32.991: SCHED: Ethernet Bridge Process: install watched boolean System Initialized(633B2014), os:1 ah:0APAVC Protocol list already initialized.
*Mar 1 00:00:32.991: Start STILE Activation
APAVC: Succeeded to activate all the STILE protocols.
APAVC: Registering with CFT
*Mar 1 00:00:33.395: APAVC: CFT registration of delete callback succeeded
APAVC: Reattaching Original Buffer pool for system use
*Mar 1 00:00:33.623: Found crash file: 'crashinfo_19930301-004058-UTC'
*Jul 14 12:05:24.191: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to the reason code 39
*Jul 14 12:05:24.191: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to the reason code 39
*Jul 14 12:05:24.211: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1530 Software (ap1g3-K9W8-M), Version 15.3(3)JK7, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2022 by Cisco Systems, Inc.
Compiled Sat 26-Feb-22 07:36 by mcpre
*Jul 14 12:05:24.211: %SNMP-5-COLDSTART: SNMP agent on host AP78da.6e59.ad08 is undergoing a cold start
*Jul 14 12:05:24.263: SCHED: Ethernet Bridge Process: remove watched boolean System Initialized(633B2014)
*Jul 14 12:05:24.263: SCHED: Ethernet Bridge Process: install watched queue Soap BVI input queue(665F873C), os:0 ah:0
*Jul 14 12:05:24.367: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to the reason code 10
*Jul 14 12:05:24.367: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to the reason code 10
*Jul 14 12:05:24.367: %CDP_PD-4-POWER_OK: Full power - HIGH_POWER inline power source
*Jul 14 12:05:24.391: %CAPWAP-5-AP_EASYADMIN_INFO: AP Easy Admin information - EASY_ADMIN is not set, turn off easy admin service!
*Jul 14 12:05:24.391: %CAPWAP-5-AP_EASYADMIN_INFO: AP Easy Admin information - Easy Admin is not enabled, turn it off!
*Jul 14 12:05:24.415: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to the reason code 39
*Jul 14 12:05:24.415: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to the reason code 39
*Jul 14 12:05:24.455: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to the reason code 10
*Jul 14 12:05:24.471: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to the reason code 10lwapp_crypto_init: MIC Present and Parsed Successfully
*Jul 14 12:05:25.967: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Jul 14 12:05:33.883: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.1.19, mask 255.255.255.0, hostname AP78da.6e59.ad08
*Jul 14 12:05:42.643: Currently running a Release Image
validate_sha2_block: Failed to get certificate chain
*Jul 14 12:05:42.647: Using SHA-1 signed certificate for image signing validation.%Default route without gateway, if not a point-to-point interface, may impact performance
*Jul 14 12:05:53.763: AP image integrity check PASSED
*Jul 14 12:05:53.779: Non-recovery image. PNP Not required.
*Jul 14 12:05:53.799: validate_sha2_block:No SHA2 Block present on this AP.
*Jul 14 12:05:53.839: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Jul 14 12:05:54.839: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Jul 14 12:05:54.847: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Jul 14 12:05:55.839: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Jul 14 12:05:55.907: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Jul 14 12:05:56.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
%Error opening flash:/capwap-saved-config (No such file or directory)
%Error opening flash:/capwap-saved-config-bak (No such file or directory)
%Error opening flash:/pnp-saved-config (No such file or directory)
no ip http secure-server
^
% Invalid input detected at '^' marker.
*Jul 14 12:06:03.883: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 0 CLI Request Triggered
*Jul 14 12:06:04.883: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 514 started - CLI initiated
User Access Verification
Username:
Username:
Username: %No matching route to delete
Translating "CISCO-CAPWAP-CONTROLLER.fts.local"...domain server (192.168.3.60)
*Jul 14 12:07:39.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
*Jul 14 12:07:40.459: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
*Jul 14 12:07:40.459: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
*Jul 14 12:07:45.459: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
*Jul 14 12:07:45.459: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.99
*Jul 14 12:07:45.459: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
*Jul 14 12:07:44.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.100 peer_port: 5246
*Jul 14 12:07:45.471: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.100 peer_port: 5246
*Jul 14 12:07:45.471: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.100
*Jul 14 12:07:50.471: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.100
*Jul 14 12:07:50.471: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.100
*Jul 14 12:07:50.471: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.100:5246
*Jul 14 12:07:51.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port:
07-14-2022 05:34 AM
Ok, how about "dir"?
07-14-2022 12:36 PM
This is the output of dir command:
Directory of flash:/
2 -rwx 488 Mar 1 1993 00:02:57 +00:00 dfs_event.txt
3 -rwx 99868 Jul 14 2022 12:05:24 +00:00 event.log
4 -rwx 36 Mar 1 1993 00:00:27 +00:00 mesh_port_cfg.txt
5 -rwx 165029 Jan 5 2016 08:20:29 +00:00 event.r1
6 drwx 2048 Mar 2 1993 04:58:10 +00:00 ap1g3-k9w8-mx.153-3.JK7
22 drwx 2048 Mar 1 1993 00:00:45 +00:00 configs
23 -rwx 98054 Oct 19 2014 05:08:35 +00:00 event.r0
24 -rwx 299 Jul 14 2022 18:56:05 +00:00 env_vars
25 -rwx 0 Jul 14 2022 07:20:01 +00:00 config.txt
26 -rwx 3596 Mar 1 1993 00:40:58 +00:00 ap_system-sw_upgrade_poll.shtml
27 -rwx 7192 Jul 14 2022 17:58:19 +00:00 private-multiple-fs
28 -rwx 285439 Mar 1 1993 00:40:58 +00:00 crashinfo_19930301-004058-UTC
29 -rwx 8740 Mar 2 1993 04:32:48 +00:00 private-config
07-14-2022 03:40 PM
Hmmmm ... Someone deleted the RCV images.
Upload the latest RCV image up to the AP using this command: archive download-sw /over tftp://<TFTP_IP_ADDRESS>/FILENAME.TAR
After the firmware is uploaded, reboot the AP. It should load the RCV image.
Post the boot-up process when this is happening.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide