cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3727
Views
0
Helpful
25
Replies
Highlighted
Beginner

Aironet 1700 AP not connection to 2504 WLC - Help please!

Hi, so I have bought 6 1700 APs and one 2504 WLC. Three of my APs have connected fine to the WLC and are registered. 3 will not!

The WLC is running software: 8.0.115.0

 

Please help I'm not a cisco iOS expert, I rely a lot on the GUI but I can do some basic CLI stuff. I don't understand why 3 would work no problems and 3 wound not work...

Here is a debug I have managed to grab:

(Cisco Controller) debug>capwap events enable

(Cisco Controller) debug>*spamApTask0: Apr 27 21:21:58.414: f0:7f:06:09:e3:b4 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
*spamApTask0: Apr 27 21:21:58.414: f0:7f:06:09:e3:b4 Discarding discovery request in LWAPP from AP supporting CAPWAP

*spamApTask0: Apr 27 21:21:58.414: f0:7f:06:09:e3:b4 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
*spamApTask0: Apr 27 21:21:58.414: f0:7f:06:09:e3:b4 Discarding discovery request in LWAPP from AP supporting CAPWAP

*spamApTask2: Apr 27 21:22:08.413: f0:7f:06:09:e3:b4 Discovery Request from 192.168.10.230:40508

*spamApTask2: Apr 27 21:22:08.413: f0:7f:06:09:e3:b4 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 25, joined Aps =0
*spamApTask2: Apr 27 21:22:08.413: apModel: AIR-CAP1702I-Z-K9

*spamApTask2: Apr 27 21:22:08.413: apType = 45 apModel: AIR-CAP1702I-Z-K9

*spamApTask2: Apr 27 21:22:08.413: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.230 port 40508

*spamApTask2: Apr 27 21:22:08.413: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.230:40508

*spamApTask2: Apr 27 21:22:08.414: f0:7f:06:09:e3:b4 Discovery Request from 192.168.10.230:40508

*spamApTask2: Apr 27 21:22:08.414: f0:7f:06:09:e3:b4 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 25, joined Aps =0
*spamApTask2: Apr 27 21:22:08.414: apModel: AIR-CAP1702I-Z-K9

*spamApTask2: Apr 27 21:22:08.414: apType = 45 apModel: AIR-CAP1702I-Z-K9

*spamApTask2: Apr 27 21:22:08.415: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.230 port 40508

*spamApTask2: Apr 27 21:22:08.415: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.230:40508


(Cisco Controller) debug>pm pki enable

(Cisco Controller) debug>*spamApTask2: Apr 27 21:22:18.411: f0:7f:06:09:e3:b4 DTLS connection not found, creating new connection for 192:168:10:230 (40508) 192:168:10:4 (5246)

*spamApTask0: Apr 27 21:24:28.897: f0:7f:06:09:e3:b4 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
*spamApTask0: Apr 27 21:24:28.897: f0:7f:06:09:e3:b4 Discarding discovery request in LWAPP from AP supporting CAPWAP

*spamApTask7: Apr 27 21:24:39.895: f0:7f:06:09:e3:b4 Discovery Request from 192.168.10.235:40508

*spamApTask7: Apr 27 21:24:39.895: f0:7f:06:09:e3:b4 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 25, joined Aps =0
*spamApTask7: Apr 27 21:24:39.895: apModel: AIR-CAP1702I-Z-K9

*spamApTask7: Apr 27 21:24:39.895: apType = 45 apModel: AIR-CAP1702I-Z-K9

*spamApTask7: Apr 27 21:24:39.895: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.235 port 40508

*spamApTask7: Apr 27 21:24:39.895: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.235:40508

*spamApTask7: Apr 27 21:24:39.896: f0:7f:06:09:e3:b4 Discovery Request from 192.168.10.235:40508

*spamApTask7: Apr 27 21:24:39.896: f0:7f:06:09:e3:b4 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 25, joined Aps =0
*spamApTask7: Apr 27 21:24:39.896: apModel: AIR-CAP1702I-Z-K9

*spamApTask7: Apr 27 21:24:39.896: apType = 45 apModel: AIR-CAP1702I-Z-K9

*spamApTask7: Apr 27 21:24:39.896: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.235 port 40508

*spamApTask7: Apr 27 21:24:39.896: f0:7f:06:09:e3:b4 Discovery Response sent to 192.168.10.235:40508

*spamApTask7: Apr 27 21:24:50.893: f0:7f:06:09:e3:b4 DTLS connection not found, creating new connection for 192:168:10:235 (40508) 192:168:10:4 (5246)

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: called to evaluate <cscoSha2IdCert>

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 5, ID cert >bsnSslWebauthCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 4, ID cert >bsnSslWebadminCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 3, ID cert >cscoSha2IdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetDERIDCert: Using SHA2 Id cert on WLC

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCertFromCID: called to get cert for CID 193d632b

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCertFromCID: comparing to row 5, certname >bsnSslWebauthCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCertFromCID: comparing to row 4, certname >bsnSslWebadminCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCertFromCID: comparing to row 3, certname >cscoSha2IdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: called to evaluate <cscoSha2IdCert>

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 5, ID cert >bsnSslWebauthCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 4, ID cert >bsnSslWebadminCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetCID: comparing to row 3, ID cert >cscoSha2IdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetDERIDCertPrivateKey: Using SHA2 Id cert Private Keys on WLC

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: called to get key for CID 193d632b

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: comparing to row 3, certname >cscoSha2IdCert<

*spamApTask7: Apr 27 21:24:50.894: sshpmGetSshPrivateKeyFromCID: match in row 3

*emWeb: Apr 27 21:25:04.437: sshpmUpdateCertConfig: called.

*emWeb: Apr 27 21:25:04.437: sshpmUpdateCertConfig: writing out credential index.

*sshpmLscTask: Apr 27 21:25:06.446: sshpmLscTask: LSC Task received a message 4
*spamApTask2: Apr 27 21:25:08.446: f0:7f:06:09:e3:b4 DTLS Handshake Timeout server (192.168.10.4:5246), client (192.168.10.230:40508)
*spamApTask2: Apr 27 21:25:08.447: acDtlsPlumbControlPlaneKeys: lrad:192.168.10.230(40508) mwar:192.168.10.4(5246)

*spamApTask2: Apr 27 21:25:08.450: f0:7f:06:09:e3:b4 DTLS connection closed event receivedserver (192.168.10.4/5246) client (192.168.10.230/40508)
*spamApTask2: Apr 27 21:25:08.450: f0:7f:06:09:e3:b4 No entry exists for AP (192.168.10.230/40508)
*spamApTask2: Apr 27 21:25:08.450: f0:7f:06:09:e3:b4 No AP entry exist in temporary database for 192.168.10.230:40508

UC540 system with 8.6.2 Software Pack
25 REPLIES 25
Highlighted
Hall of Fame Community Legend

APf07f.0609.e304>

You need to be in "enable" mode.

Highlighted

ha yeah I thought that might be the case.... i have executed that command. standby :)

 

PS thanks for your help on this!

UC540 system with 8.6.2 Software Pack
Highlighted

ok here is the output after executing that command and doing a reload....

cisco AIR-CAP1702I-Z-K9 (PowerPC) processor (revision A0) with 376810K/134656K bytes of memory.
Processor board ID FGL1839XDJ5
PowerPC CPU at 800Mhz, revision number 0x2151
Last reset from power-on
LWAPP image version 8.0.72.236
1 Gigabit Ethernet interface

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: F0:7F:06:09:E3:04
Part Number                          : 73-16776-01
PCA Assembly Number                  : 000-00000-00
PCA Revision Number                  :
PCB Serial Number                    : FOC18326WUZ
Top Assembly Part Number             : 068-05568-01
Top Assembly Serial Number           : FGL1839XDJ5
Top Revision Number                  : A0
Product/Model Number                 : AIR-CAP1702I-Z-K9
% Please define a domain-name first.
ipv6 enable
  ^
% Invalid input detected at '^' marker.

ipv6 address autoconfig
  ^
% Invalid input detected at '^' marker.

ipv6 address dhcp
  ^
% Invalid input detected at '^' marker.

 

Press RETURN to get started!


*Mar  1 00:00:13.447: APAVC: Initial WLAN Buffers Given to System is  2500

*Mar  1 00:00:13.495: APAVC:  WlanPAKs 42878 RadioPaks  42270

*Mar  1 00:00:13.495: Starting Ethernet promiscuous mode
*Mar  1 00:00:13.499: %LWAPP-3-CLIENTERRORLOG: Config load from flash failed. Initialising Cfg

*Mar  1 00:00:15.499: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar  1 00:00:15.499: %LINK-6-UPDOWN: Interface GigabitEthernet1, changed state to up
*Mar  1 00:00:15.639: %SYS-5-RESTART: System restarted --
Cisco IOS Software, c1700 Software (AP3G2-RCVK9W8-M), Version 15.3(3)JA, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2014 by Cisco Systems, Inc.
Compiled Fri 15-Aug-14 12:27 by prod_rel_team
*Mar  1 00:00:15.683: %LWAPP-3-CLIENTERRORLOG: Config load from flash failed. Initialising Cfg
lwapp_crypto_init: MIC Present and Parsed Successfully

*Mar  1 00:00:15.823: %SSH-5-ENABLED: SSH 2.0 has been enabled
*Mar  1 00:00:16.667: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Mar  1 00:00:20.459: DPAA Initialization Complete
*Mar  1 00:00:20.459: %SYS-3-HARIKARI: Process DPAA INIT top-level routine exited
*Mar  1 00:00:21.459: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar  1 00:00:23.459: %LINK-6-UPDOWN: Interface BVI1, changed state to down
*Mar  1 00:00:24.459: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to down
*Mar  1 00:00:27.671: %LINK-6-UPDOWN: Interface BVI1, changed state to up
*Mar  1 00:00:28.671: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Mar  1 00:00:30.791: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.10.182, mask 255.255.255.0, hostname APf07f.0609.e304

bridge-group 1 source-learning
                ^
% Invalid input detected at '^' marker.
%Default route without gateway, if not a point-to-point interface, may impact performance
*Mar  1 00:00:34.499: %LWAPP-3-CLIENTERRORLOG: Config load from flash failed. Initialising Cfg

%Error opening flash:/capwap-saved-config (No such file or directory)
*Mar  1 00:01:07.519: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*May 12 23:45:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.4 peer_port: 5246Peer certificate verification failed FFFFFFFF

*May 12 23:45:49.103: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:496 Certificate verified failed!
*May 12 23:45:49.103: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 192.168.10.4:5246
*May 12 23:45:49.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.4:5246
*May 12 23:45:57.815: %CDP_PD-4-POWER_OK: 15.4 W power - NEGOTIATED inline power source
*May 12 23:45:59.815: %LINK-5-CHANGED: Interface GigabitEthernet1, changed state to administratively down
*May 12 23:45:59.895: %CDP_PD-4-POWER_OK: 15.4 W power - NEGOTIATED inline power source
*May 12 23:47:13.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*May 12 23:47:14.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.4 peer_port: 5246
*May 12 23:47:43.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2214 Max retransmission count reached for Connection 0x5CFFC50!

UC540 system with 8.6.2 Software Pack
Highlighted

it looks like i have the problem described in these two articles:

http://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63916.html

https://rscciew.wordpress.com/2014/11/29/ap-joining-issue-to-wlc-running-8-0-100-0/

 

My WLC is running: 8.0.115.0

 

I have verified my 3 access points are affected via this tool:

http://serialnumbervalidation.com/63916/cgi-bin/index.cgi

 

Now I just need to wait for my smartnet to come active so I can actually downgrade the WLC to fix this issue....

Seriously cisco, don't send out broken hardware/software from the factory!!!

UC540 system with 8.6.2 Software Pack
Highlighted
Hall of Fame Community Legend

Your WLC is running 8.0.115.X so the AP isn't involved with this.  

Highlighted

oh ok....

looks like the exact same issue. Where to from here? :)

if you don't mind still helping...

UC540 system with 8.6.2 Software Pack
Highlighted
Hall of Fame Community Legend

Let's just say the FN is incorrect, see if you can try loading 8.1.102.X and see if changes anything. 

 

If still not, then I'd say open a TAC Case. 

Highlighted

OK, thank you so much for your help so far! :)

UC540 system with 8.6.2 Software Pack
Highlighted

Hello, just an update on this...

I opened a TAC Case after getting my SmartNet.

The solution to the problem was updating the WLC to 8.1.101 firmware and then the APs joined. This was the published and well known bug with APs manufactured in a certain time frame missing the SHA2 certificate or something like that.

All sorted now :)

UC540 system with 8.6.2 Software Pack
Highlighted

Hello Everyone,
Jeremy, i'm getting the same error, but my WLC is 8.1.102.0.

See the AP:

APe865.496f.0dcc#show version
Cisco IOS Software, C1700 Software (AP3G2-RCVK9W8-M), Version 15.3(3)JA3, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu 19-Feb-15 10:27 by prod_rel_team

ROM: Bootstrap program is C1700 boot loader
BOOTLDR: C1700 Boot Loader (AP3G2-BOOT-M) LoaderVersion 15.3() [ TRUE]

APe865.496f.0dcc uptime is 17 minutes
System returned to ROM by power-on
System image file is "flash:/ap3g2-rcvk9w8-mx/ap3g2-rcvk9w8-xx"
Last reload reason:

(EULA)

cisco AIR-CAP1702I-Z-K9 (PowerPC) processor (revision A0) with 376810K/134656K bytes of memory.
Processor board ID TSP1923AAFT
PowerPC CPU at 800Mhz, revision number 0x2151
Last reset from power-on
LWAPP image version 8.0.115.0
1 Gigabit Ethernet interface

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: E8:65:49:6F:0D:CC
Part Number                          : 73-16776-01
PCA Assembly Number                  : 000-00000-00
PCA Revision Number                  :
PCB Serial Number                    : TSP19223357
Top Assembly Part Number             : 068-05568-02
Top Assembly Serial Number           : TSP1923AAFT
Top Revision Number                  : A0
Product/Model Number                 : AIR-CAP1702I-Z-K9

 

Configuration register is 0xF

-------------------------------------------------

And the WLC:
 

(Cisco Controller) >show sysinfo

Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.1.102.0
RTOS Version..................................... 8.1.102.0
Bootloader Version............................... 8.1.102.0
Emergency Image Version.......................... 8.1.102.0

Build Type....................................... DATA + WPS

System Name...................................... CiscoWirelessController
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
IP Address....................................... 192.168.33.232
IPv6 Address..................................... ::
System Up Time................................... 0 days 1 hrs 12 mins 27 secs
System Timezone Location.........................
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180

Configured Country............................... BR  - Brazil

--More-- or (q)uit

State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 1
Number of Active Clients......................... 0

Burned-in MAC Address............................ 00:50:56:A3:2B:E1
Maximum number of APs supported.................. 200
System Nas-Id.................................... ENGdB-CiscoWirelessController
WLC MIC Certificate Types........................ SHA1

----------------------------------

I've execute on AP: capwap ap controller ip address 192.168.33.232

----------------------------------


Controller Logs:

*spamReceiveTask: Jul 07 14:31:48.959: Received SPAM_UPDATE_NEXT_HOP_MAC
*spamApTask3: Jul 07 14:36:48.056: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc packet received of length 189 from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Msg Type = 1 Capwap state = 0

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery Request from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 1 msgEleType = 20

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 160

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 62 msgEleType = 38

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc ApModel: AIR-CAP1702I-Z-K9

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 94

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 40 msgEleType = 39

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 50

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 1 msgEleType = 41

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 45

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 1 msgEleType = 44

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 40

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 10 msgEleType = 37

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Vendor specific payload from AP  E8:65:49:6F:0D:CC validated

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 26

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc msgEleLength = 22 msgEleType = 37

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Vendor specific payload from AP  E8:65:49:6F:0D:CC validated

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Total msgEleLen = 0

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc 1. 0 0

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc 2. 232 3

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc 3. 0 0

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc 4. 200 0

*spamApTask3: Jul 07 14:36:48.056: apModel: AIR-CAP1702I-Z-K9

*spamApTask3: Jul 07 14:36:48.056: apType = 54 apModel: AIR-CAP1702I-Z-K9

*spamApTask3: Jul 07 14:36:48.056: Unknown AP type. Using Controller Version!!!

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: AC Descriptor message element len = 40

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc acName = ENGdB-CiscoWirelessController

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp:AC Name message element length = 73

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: WTP Radio Information msg length = 82

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: CAPWAP Control IPV4 Address len = 92

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: CAPWAP Control IPV6 Address len = 92

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: Mwar type payload len = 103

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: Expire MIC type payload len = 117

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery resp: Time sync payload len = 132

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery Response sent to 192.168.82.166 port 61661

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc Discovery Response sent to 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:48.056: e8:65:49:6f:0d:cc WTP already released
*spamApTask0: Jul 07 14:36:48.057: e8:65:49:6f:0d:cc Received LWAPP DISCOVERY REQUEST to 00:50:56:a3:2b:e1 on port '1'
*spamApTask0: Jul 07 14:36:48.057: e8:65:49:6f:0d:cc LWAPP Discovery Request AP Software Version: 0x8007300
*spamApTask0: Jul 07 14:36:48.057: e8:65:49:6f:0d:cc Discarding discovery request in LWAPP from AP supporting CAPWAP

*spamApTask3: Jul 07 14:36:58.055: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.055: bc:ea:fa:d8:4f:e5 DTLS connection not found, creating new connection for 192:168:82:166 (61661) 192:168:33:232 (5246)

*spamApTask3: Jul 07 14:36:58.057: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.280: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.280: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.280: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.281: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.286: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.286: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.287: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.287: bc:ea:fa:d8:4f:e5 DTLS connection 0x8e882a0 established
*spamApTask6: Jul 07 14:36:58.287: CAPWAP DTLS session established msg

*spamApTask6: Jul 07 14:36:58.287: bc:ea:fa:d8:4f:e5 DTLS Session established server (192.168.33.232:5246), client (192.168.82.166:61661)
*spamApTask6: Jul 07 14:36:58.287: bc:ea:fa:d8:4f:e5 Starting wait join timer for AP: 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.289: bc:ea:fa:d8:4f:e5 CAPWAP Control Msg Received from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc packet received of length 1400 from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Msg Type = 3 Capwap state = 0

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Join Request from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1348

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1282

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1238

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1218

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1210

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1205

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1200

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1192

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1186

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Vendor specific payload from AP  E8:65:49:6F:0D:CC validated

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Total msgEleLen = 1169

*spamApTask3: Jul 07 14:36:58.289: e8:65:49:6f:0d:cc Vendor specific payload from AP  E8:65:49:6F:0D:CC validated

*spamApTask3: Jul 07 14:36:58.289: update ap status:00:00:00:00:00:00 ,index:77

*spamApTask3: Jul 07 14:36:58.290: Unable to find deleted AP 00:00:00:00:00:00
*spamApTask3: Jul 07 14:36:58.290: e8:65:49:6f:0d:cc Failed to allocate database entry for AP 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.290: e8:65:49:6f:0d:cc Failed to add database entry for 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.290: e8:65:49:6f:0d:cc Join Request failed!

*spamApTask3: Jul 07 14:36:58.290: e8:65:49:6f:0d:cc State machine handler: Failed to process  msg type = 3 state = 0 from 192.168.82.166:61661

*spamApTask3: Jul 07 14:36:58.290: e8:65:49:6f:0d:cc Failed to parse CAPWAP packet from 192.168.82.166:61661

---------------------------------------------

 

AP LOGs:

*Mar  1 00:05:39.147: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.82.166, mask 255.255.254.0, hostname APe865.496f.0dcc

*Mar  1 00:05:51.595: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Jul  7 14:36:58.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.33.232 peer_port: 5246
*Jul  7 14:36:58.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.33.232 peer_port: 5246
*Jul  7 14:36:58.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.33.232
*Jul  7 14:37:03.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.33.232
ipv6 enable
  ^
% Invalid input detected at '^' marker.

ipv6 address autoconfig
  ^
% Invalid input detected at '^' marker.

ipv6 address dhcp
  ^
% Invalid input detected at '^' marker.

*Jul  7 14:37:57.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.33.232:5246
*Jul  7 14:37:58.003: %LWAPP-3-CLIENTERRORLOG: Config load from flash failed. Initialising Cfg

*Jul  7 14:37:58.015: %LWAPP-3-CLIENTERRORLOG: Config load from flash failed. Initialising Cfg

 

-------------------------------------

 

It's my first time using Cisco products, sorry for it, but can anyone help me to make my wireless work?

 

Highlighted

Guys,

Sorry, the solution was ACCEPT the EULA! I didnt accept the Licence and it just adopt and find the AP's before I change de priority to "High" and save.

Follow it: http://www.cisco.com/c/en/us/support/docs/wireless/virtual-wireless-controller/113677-virtual-wlan-dg-00.pdf

Thanks! 

Content for Community-Ad