el 09-06-2019 08:57 AM
Buenas, tengo 15 equipos (AIR-CAP1602I-A-K9 y AIR-CAP2602I-A-K9 ) conectados en el WLC virtual ver. 8.0.133.0, tengo 2 equipos que cada 2 semana se salen del WLC y los tengo que apagar y volver prender r para que vuelvan aparecer en el WLC, quisiera saber si hay alguna forma de ver porque se desconectan del controller, ver algún log en específico. Los equipos que se desconectan se pueden acceder vía ip sin problema
Saludos y muchas gracias
¡Resuelto! Ir a solución.
el 09-06-2019 12:36 PM
Hola @supercanal
En el show tech se muestra la siguiente informacion:
AP failure counters: LinkFailure = 546, SpamReboots = 49, ApCrashes = 1
Te recomiendo que valides el cableado de este AP, parece que esta teniendo flapping.
Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**
*Tu reconocimiento nos alienta a seguir participando en los foros *
el 09-06-2019 10:00 AM
Hola @supercanal
Puedes compartir los siguientes logs.
WLC:
debug capwap error
deug capwap events
show log.
AP:
show tech.
Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**
*Tu reconocimiento nos alienta a seguir participando en los foros *
el 09-06-2019 10:18 AM
Te paso los log,
(Cisco Controller) >debug capwap errors enable
(Cisco Controller) >debug capwap events enable
(Cisco Controller) >*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Adding mobile on LWAPP AP c4:72:95:65:1b:10(0)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 apfMsAssoStateInc
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 apfMsOpenStateInc
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 apfHreapClientCreate (apf_80211.c:13708) Changing state for mobile a4:07:b6:f6:c1:43 on AP c4:72:95:65:1b:10 from Idle to Associated
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 apfMsRunStateInc
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 0.0.0.0 START (0) Change state to RUN (20) last state START (0)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 override for default ap group, marking intgrp NULL
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 107
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Re-applying interface policy for client
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Check before Setting the NAS Id to WLAN specific Id ''
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Applying site-specific Local Bridging override for station a4:07:b6:f6:c1:43 - vapId 4, site 'MSO', interface 'management'
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Applying Local Bridging Interface Policy for station a4:07:b6:f6:c1:43 - vlan 0, interface id 0, interface 'management', nasId:''
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 override from ap group, removing intf group from mscb
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Applying site-specific override for station a4:07:b6:f6:c1:43 - vapId 4, site 'MSO', interface 'management'
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Re-applying interface policy for client
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 Stopping deletion of Mobile Station: (callerId: 83)
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 PMK: Sending cache delete
*apfReceiveTask: Sep 06 14:11:40.546: a4:07:b6:f6:c1:43 PMK: Sending cache add
*Apf Guest: Sep 06 14:12:16.413: Wired client head is NULL, no clients in the list. Number of clients = 0
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 apfHreapClientCreate (apf_80211.c:13708) Changing state for mobile a4:07:b6:f6:c1:43 on AP c4:72:95:65:1b:10 from Associated to Associated
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Change state to RUN (20) last state RUN (20)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 override for default ap group, marking intgrp NULL
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 107
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Re-applying interface policy for client
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Check before Setting the NAS Id to WLAN specific Id ''
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Applying site-specific Local Bridging override for station a4:07:b6:f6:c1:43 - vapId 4, site 'MSO', interface 'management'
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Applying Local Bridging Interface Policy for station a4:07:b6:f6:c1:43 - vlan 0, interface id 0, interface 'management', nasId:''
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 override from ap group, removing intf group from mscb
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Applying site-specific override for station a4:07:b6:f6:c1:43 - vapId 4, site 'MSO', interface 'management'
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Re-applying interface policy for client
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 0.0.0.0 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 Stopping deletion of Mobile Station: (callerId: 83)
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 PMK: Sending cache delete
*apfReceiveTask: Sep 06 14:12:19.197: a4:07:b6:f6:c1:43 PMK: Sending cache add
*Apf Guest: Sep 06 14:13:47.423: Wired client head is NULL, no clients in the list. Number of clients = 0
Tambien este log
(Cisco Controller) >show traplog
Number of Traps Since Last Reset ............ 2756
Number of Traps Since Log Last Displayed .... 2363
Client Traps Statistics
Client Association Traps .................... 0
Client Disassociation Traps ................. 1044
Client Authentication Traps ................. 86
Client Deauthentication Traps ............... 518
Client Association Fail Traps ............... 21
Client Authnetication Fail Traps ............ 0
Station Authnetication Fail Traps ........... 0
Client Excluded Traps ....................... 1
Client Static IP Fail Traps ................. 0
Association Fail Traps ...................... 0
Associate Fail Traps ........................ 0
Client Association Data Stats Traps ......... 0
Client Disassociation Data Stats Traps ...... 0
Client Association NAC Alert Traps .......... 0
Client Web Auth User Login Traps ............ 0
Client Web Auth User Logout Traps ........... 0
--More-- or (q)uit
Client Enhanced Traps Sent Since Reset ............. 0
Client Association Enhanced Traps .................. 0
Client Association Enhanced Traps Send Fail ........ 0
Client Deauthentication Enhanced Traps ............. 0
Client Deauthentication Enhanced Traps Send Fail ... 0
Client Authentication Enhanced Traps ............... 0
Client Authentication Enhanced Traps Send Fail ..... 0
Client Stats Enhanced Traps ........................ 0
Client Stats Enhanced Traps Send Fail .............. 0
AP Traps Statistics
AP Interface Up Traps ............. 228
AP Interface Down Traps ........... 200
AP Associated Traps ............... 15
AP Disassociated Traps ............ 0
el 09-06-2019 10:44 AM
Como podria capturar el trafico que iria del equipo al AP para la conexion y poder ver esa traba del DHCP.
el 09-06-2019 10:52 AM
Hola @supercanal
Nos compartes el show tech de los APs?
el 09-06-2019 11:35 AM
el 09-06-2019 12:07 PM
el 09-06-2019 12:36 PM
Hola @supercanal
En el show tech se muestra la siguiente informacion:
AP failure counters: LinkFailure = 546, SpamReboots = 49, ApCrashes = 1
Te recomiendo que valides el cableado de este AP, parece que esta teniendo flapping.
Espero que la información haya sido útil y si no tienes más preguntas recuerda cerrar el topic, seleccionando la respuesta como "Respuesta correcta"
**Please rate the answer if this information was useful***
**Por favor si la información fue util marca esta respuesta como correcta**
*Tu reconocimiento nos alienta a seguir participando en los foros *
el 09-09-2019 10:20 AM
Estimado @Daniel Ordóñez Flores gracias por la atención y comentarios brindados para ayudar a resolver la duda
Descubra y salve sus notas favoritas. Vuelva a encontrar las respuestas de los expertos, guías paso a paso, temas recientes y mucho más.
¿Es nuevo por aquí? Empiece con estos tips. Cómo usar la comunidad Guía para nuevos miembros
Navegue y encuentre contenido personalizado de la comunidad