cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4106
Views
0
Helpful
5
Replies

AP not join to WLC9800-CL

S M
Level 1
Level 1

Hi
I am trying to join AP9120 to WLC9800CL.
However, an error occurs.
Please help me.

 

C9800-CL-K9 : Version 16.12.2t

C9120AXI-K : Version 8.10.105.0

 

<AP Log>

[*04/23/2020 08:32:32.8640] CAPWAP State: Discovery
[*04/23/2020 08:32:32.8650] Got WLC address 10.10.2.200 from DHCP.
[*04/23/2020 08:32:32.8650] Got WLC address 10.117.110.100 from DHCP.
[*04/23/2020 08:32:32.8670] Discovery Request sent to 10.10.2.200, discovery type DHCP(2)
[*04/23/2020 08:32:32.8710] Discovery Request sent to 10.10.116.111, discovery type DHCP(2)
[*04/23/2020 08:32:32.8770] Discovery Request sent to 10.119.105.114, discovery type DHCP(2)
[*04/23/2020 08:32:32.8780] Discovery Request sent to 10.117.110.100, discovery type DHCP(2)
[*04/23/2020 08:32:32.8790] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*04/23/2020 08:32:32.8790] Discovery Response from 10.10.2.200
[*04/23/2020 08:32:43.0000]
[*04/23/2020 08:32:43.0000] CAPWAP State: DTLS Setup
[*04/23/2020 08:33:40.0150]
[*04/23/2020 08:33:40.0150] CAPWAP State: DTLS Teardown
[*04/23/2020 08:33:40.0300] Aborting image download(0x0): Dtls cleanup,
[*04/23/2020 08:33:40.0940] do ABORT, part1 is active part
[*04/23/2020 08:33:40.1090] upgrade.sh: Cleanup tmp files ...
[*04/23/2020 08:33:44.7670] No more AP manager addresses remain..
[*04/23/2020 08:33:44.7670] No valid AP manager found for controller 'WLC_2' (ip: 10.10.2.200)
[*04/23/2020 08:33:44.7670] Failed to join controller WLC_2.
[*04/23/2020 08:33:44.7670] Failed to join controller.
[*04/23/2020 08:33:45.7670] ipv6 gw config loop in discovery timer expiry
[*04/23/2020 08:33:47.7670] ipv6 gw config loop in discovery timer expiry
[*04/23/2020 08:33:49.7680] ipv6 gw config loop in discovery timer expiry
[*04/23/2020 08:33:51.7680] ipv6 gw config loop in discovery timer expiry
[*04/23/2020 08:33:53.7680] ipv6 gw config loop in discovery timer expiry
[*04/23/2020 08:33:55.7690] ipv6 gw config loop in Ac discovery
[*04/23/2020 08:33:57.7690] ipv6 gw config loop in Ac discovery

 

<WLC SSC Not Create>

WLC_2#wireless config vwlc-ssc key-size 2048 signature-algo sha384 password 0 cisco
Configuring vWLC-SSC...

WLC_2# Process Forced Exit- MAXRUN timer expired.
while executing
"after 100"
(procedure "cli_read_pattern" line 11)
invoked from within
"cli_read_pattern $cli_sess(fd) $expect"
(procedure "run_command_list" line 42)
invoked from within
"run_command_list cli_sess clist"
(procedure "config_vwlc_ssc_trustpoint" line 78)
invoked from within
"config_vwlc_ssc_trustpoint cli_sess input_args"
(file "tmpsys:/eem_policy/Mandatory.crypto_pki_vwlc_ssc_config.tcl" line 1076)
Tcl policy execute failed: Process Forced Exit- MAXRUN timer expired.Process Forced Exit- MAXRUN timer expired.

5 Replies 5

marce1000
VIP
VIP

 

 - These items could be related to software bugs, check if newer software versions are available for your particular device. If applicable and feasible, upgrade - and check if the problem persists.

 M.



-- ' 'Good body every evening' ' this sentence was once spotted on a logo at the entrance of a Weight Watchers Club !

ammahend
VIP
VIP

could you also share these outputs from controller

show ip int brief

show wireless interface summary

show wireless management trustpoint

-hope this helps-

WLC9800#sh ver
Cisco IOS XE Software, Version 17.01.01t
Cisco IOS Software [Amsterdam], C9800-CL Software (C9800-CL-K9_IOSXE), Version 17.1.1t, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2020 by Cisco Systems, Inc.
Compiled Sat 30-May-20 01:17 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2020 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON

WLC9800 uptime is 4 hours, 14 minutes
Uptime for this control processor is 4 hours, 16 minutes
System returned to ROM by reload at 11:18:58 Malaysi Sun Jul 26 2020
System restarted at 11:20:58 Malaysi Sun Jul 26 2020
System image file is "bootflash:packages.conf"
Last reload reason: Reload Command

 

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

AIR License Level: AIR DNA Essentials
Next reload AIR license Level: AIR DNA Essentials

Smart Licensing Status: REGISTERED/AUTHORIZED

cisco C9800-CL (VXE) processor (revision VXE) with 4112540K/3075K bytes of memory.
Processor board ID 9K4AWGA18HS
2 Virtual Ethernet interfaces
3 Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
8106704K bytes of physical memory.
6201343K bytes of virtual hard disk at bootflash:.
Installation mode is INSTALL


Configuration register is 0x2102

WLC9800#

WLC9800#show ip int brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet1 192.168.19.20 YES NVRAM up up
GigabitEthernet2 unassigned YES unset up up
GigabitEthernet3 unassigned YES unset up up
Vlan1 unassigned YES NVRAM administratively down down
Vlan51 172.17.0.3 YES NVRAM up up
WLC9800#show wireless interface summary

Wireless Interface Summary


Interface Name Interface Type VLAN ID IP Address IP Netmask NAT-IP Addre ss MAC Address
-------------------------------------------------------------------------------- ------------------
Vlan51 Management 51 172.17.0.3 255.255.240.0 0.0.0.0 001e.bda0.48ff

WLC9800#show wireless interface summary

Wireless Interface Summary


Interface Name Interface Type VLAN ID IP Address IP Netmask NAT-IP Address MAC Address
--------------------------------------------------------------------------------------------------
Vlan51 Management 51 172.17.0.3 255.255.240.0 0.0.0.0 001e.bda0.48ff

WLC9800#

 

*********************** ping from WLC to AP ********************

WLC9800#ping 10.5.0.100
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.5.0.100, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
WLC9800#

 

*********************** ping from AP to WLC ********************

AP3C41.0EE3.29B8#ping 192.168.19.20
Sending 5, 100-byte ICMP Echos to 192.168.19.20, timeout is 2 seconds
!
!!
!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.734/0.791/0.869 ms

###############################################################

 

U-Boot 2012.07 (btldr release 46) (Mar 29 2019 - 23:05:21)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM: 1022 MiB
Nand: Detected ONFI Winbond NAND 256MiB 3,3V 8-bit
NAND ECC=1 ECC_THRESHOLD(NAND ECC-1)=0
SF: Detected MX25L3205D with page size 4 KiB, total 4 MiB
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:0], write_counter=5
machid: 8010001
Net: MAC0 addr:3c:41:e:e3:29:b8
AR8033 PHY 0
PHY ID1: 0x4d
PHY ID2: 0xd072
ipq40xx_ess_sw_init done
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part1

Booting from part1

Read 1024 bytes from volume part1 to 88000000
Read 34546212 bytes from volume part1 to 88000000
Signature returns 0
Image signing verification success, continue to run...
bootm 0x88000400
## Booting kernel from Legacy Image at 88000400 ...
## Loading init Ramdisk from multi component Legacy Image at 88000400 ...
## Flattened Device Tree from multi component Image at 88000400
Booting using the fdt at 0x8a0e880c
Loading Ramdisk to 9e111000, end 9ffff4e2 ... OK
Loading Device Tree to 9e104000, end 9e110217 ... OK
no such device nand0
Using machid 0x8010001 from environment

Starting image ...

[01/01/1970 00:00:31.8299] Linux version 3.14.43 (vipendya@cheetah-build4) (gcc version 4.7.1 (OpenWrt GCC 4.7.1 r48430) ) #1 SMP PREEMPT Sun Dec 15 02:59:21 PST 2019
[01/01/1970 00:00:31.9899] CPU: ARMv7 Processor [410fc075] revision 5 (ARMv7), cr=10c5387d
[01/01/1970 00:00:32.0899] CPU: PIPT / VIPT nonaliasing data cache, VIPT aliasing instruction cache
[01/01/1970 00:00:32.1899] Machine model: Cisco 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:32.2699] Memory policy: Data cache writealloc
[01/01/1970 00:00:32.3399] Kernel command line: console=ttyMSM0,9600n8 ubi.mtd=0 root=/dev/ram activepart=part1 activeboot=0 wdgtriggered=0 board_sku=4 clk_ignore_unused
[01/01/1970 00:00:32.5199] CPU1: Booted secondary processor
[01/01/1970 00:00:32.5799] CPU2: Booted secondary processor
[01/01/1970 00:00:32.6499] CPU3: Booted secondary processor
[01/01/1970 00:00:32.7099] buginf tty flushing thread started, ttyport=be41c000
[*01/01/1970 00:00:37.1499] buginf() enabled.
[*01/01/1970 00:00:37.1699] Made it into bootsh: Dec 15 2019 03:17:23
[*01/01/1970 00:00:37.1699] bootsh build T-a94fb481498af01da12c3f36c88ae1349886475c-ga94fb481-vipendya

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.


This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.

[ OK ] Reached target Timers.
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Created slice -.slice.
[ OK ] Created slice system.slice.
[ OK ] Created slice system-serial\x2dgetty.slice.
Starting Cisco UBIFS reformat/mount...
[ OK ] Reached target Slices.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Reached target Sockets.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco platform file generation...
Starting Cisco fips check...
Starting Cisco seed generation...
Starting Cisco system time setup...
[ OK ] Started Cisco platform file generation.
[*05/29/2020 23:59:59.0000] GCM-128 POST passed
[*05/29/2020 23:59:59.0000] GCM-256 POST passed
[*05/29/2020 23:59:59.0399] Last reload time: Jun 8 05:16:26 2020
[*06/08/2020 05:16:26.0000] Setting system time Mon Jun 8 05:16:26 UTC 2020
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco seed generation.
[ OK ] Started Cisco system time setup.
Starting Cisco nolan service...
[ OK ] Reached target Local File Systems.
Starting Cisco S10 boot service...
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
Starting Cisco act2 check...
Starting Security Auditing Service...
[*06/08/2020 05:16:26.7899] parameter passed without an option given
Starting Cisco pkg install service...
[ OK ] Started Cisco nolan service.
[ OK ] Started Security Auditing Service.
[ OK ] Started Cisco S10 boot service.
Starting Cisco watchdog...
[*06/08/2020 05:16:27.1499] === 5G radio domain is 23, COPY 5G BDF files from non_ETSI_BDF folder ===
[*06/08/2020 05:16:27.2099] 4
[*06/08/2020 05:16:27.4799] Active version: 16.12.2.132
[*06/08/2020 05:16:27.4899] Backup version: 8.5.131.0
[*06/08/2020 05:16:27.8599]
[*06/08/2020 05:16:27.8599] led pattern module start
[*06/08/2020 05:16:27.9199] Loading caldata from mtd2
[*06/08/2020 05:16:28.4299] ess-switch DT exist!
[*06/08/2020 05:16:28.4299] switchreg_base_addr: 0xc000000
[*06/08/2020 05:16:28.4299] switchreg_size: 0x80000
[*06/08/2020 05:16:28.4299] switch_access_mode: local bus
[*06/08/2020 05:16:28.4299] wan bmp:0x20
[*06/08/2020 05:16:28.4299] ess-psgmii DT exist!
[*06/08/2020 05:16:28.4299] mac mode=3
[*06/08/2020 05:16:28.4299] current mac mode = 3
[*06/08/2020 05:16:28.4299] current dts led_source_num is 5
[*06/08/2020 05:16:28.4299] mdio DT exist!
[*06/08/2020 05:16:28.4299] ssdk_plat_init start
[*06/08/2020 05:16:28.4299] enable ess clk
[*06/08/2020 05:16:28.5399] reset ok in probe!
[*06/08/2020 05:16:28.5499] PHY ID is 0x4dd072
[*06/08/2020 05:16:28.6099] Dakota Chip version 0x1401
[*06/08/2020 05:16:28.6099]
[*06/08/2020 05:16:28.6099] QCA Switch config done.
[*06/08/2020 05:16:28.6199] gcc map success!
[*06/08/2020 05:16:28.6699] qca-ssdk module init succeeded!
[*06/08/2020 05:16:28.6699]
[*06/08/2020 05:16:28.6699] QCA Switch config done.
[*06/08/2020 05:16:28.9999] crypto worker thread started
[*06/08/2020 05:16:28.9999] crypto worker thread started
[*06/08/2020 05:16:29.0999] pid 2878's current affinity mask: f
[*06/08/2020 05:16:29.0999] pid 2878's new affinity mask: e
[*06/08/2020 05:16:29.1099] pid 2877's current affinity mask: f
[*06/08/2020 05:16:29.1099] pid 2877's new affinity mask: e
[*06/08/2020 05:16:29.3699] Current value of FACTORY_RESET=0
[*05/29/2020 23:59:59.0199] Last reload time: Jun 8 05:16:26 2020
[*06/08/2020 05:16:26.0000] Setting system time Mon Jun 8 05:16:26 UTC 2020
[*06/08/2020 05:16:26.1499] device wired0 entered promiscuous mode
[*06/08/2020 05:16:26.4899]
[*06/08/2020 05:16:26.4899]
[*06/08/2020 05:16:26.4899]
[*06/08/2020 05:16:26.4899]
[*06/08/2020 05:16:26.4899] Authenticating ACT2 ID:AP1815
[*06/08/2020 05:16:26.4899] Authenticating SN:FOC241816M2
[*06/08/2020 05:16:26.4999]
[*06/08/2020 05:16:26.4999] (ACT2Boot) Hardware is Cisco (c) authentic :-)
[*06/08/2020 05:16:26.4999]
[*06/08/2020 05:16:26.5199] Seeding /dev/urandom from ACT2
Starting Cisco nss service...
[ OK ] Started Cisco watchdog.
[ OK ] Started Cisco nss service.
[ OK ] Started Cisco pkg install service.
Starting Cisco S15platform...
Starting Cisco Kclick...
[06/08/2020 05:16:32.3299] ramoops: Unknown symbol encode_rs8 (err 0)
[06/08/2020 05:16:32.3899] ramoops: Unknown symbol decode_rs8 (err 0)
[06/08/2020 05:16:32.4599] ramoops: Unknown symbol init_rs (err 0)
[ OK ] Started Cisco Kclick.
[ OK ] Started Cisco S15platform.
Starting Cisco Kclick...
Starting Cisco certificate create service...
Starting Cisco ME service...
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco Kclick.
Starting Cisco S16platfomm...
Starting Cisco syslog service...
[*06/08/2020 05:16:32.5399] stile module dp init successfully
[*06/08/2020 05:16:32.5399] NBAR Label:BLD_V169_THROTTLE_LATEST_20180831_073505 Module timestamp: Dec 15 2019 at 03:09:11 User: vipendya
[*06/08/2020 05:16:33.0499] Last reload reason : 0: unknown
[*06/08/2020 05:16:33.4399] Loading sha2...
[*06/08/2020 05:16:33.4499] Dumpping sha1...
[*06/08/2020 05:16:34.3899] Loading MIC cert and key
[*06/08/2020 05:16:34.3899] Dumpping sha2...
Starting rsyslog client...
[ OK ] Started Cisco S16platfomm.
[ OK ] Started Cisco syslog service.
[ OK ] Started rsyslog client.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ OK ] Started Cisco certificate create service.
Starting Cisco brain service...
Starting Cisco certtime service...
[*06/08/2020 05:16:35.1899] Loading MIC cert and key
[*06/08/2020 05:16:35.3999] Reading ACT2 SUDI certificates
[ OK ] Started Cisco certtime service.
[ OK ] Started Cisco brain service.
[ OK ] Started Cisco act2 check.
[*06/08/2020 05:16:35.9199] pid 3515's current affinity mask: f
[*06/08/2020 05:16:35.9199] pid 3515's new affinity mask: e
[*06/08/2020 05:16:36.3699] __mm_init_module
[*06/08/2020 05:16:36.4599] ol_ath_ahb_probe
[*06/08/2020 05:16:36.4599] ol_ath_ahb_probe: io resource start: 0xa000000, mem=0xc3800000
[*06/08/2020 05:16:36.4599]
[*06/08/2020 05:16:36.4599] __ol_ath_attach() Allocated scn bd2404c0
[*06/08/2020 05:16:36.4599] ol_ath_ahb_configure: MSI addr: 0b006040, MSI base: 00000040
[*06/08/2020 05:16:36.4699]
[*06/08/2020 05:16:36.4699] ol_ath_ahb_configure : num_desired MSI set to 0
[*06/08/2020 05:16:36.4699]
[*06/08/2020 05:16:36.4699] Using Legacy Interrupt
[*06/08/2020 05:16:36.4699]
[*06/08/2020 05:16:36.4699] Waiting for target init
[*06/08/2020 05:16:36.4699]
[*06/08/2020 05:16:36.4699] Done waiting
[*06/08/2020 05:16:36.4799] ol_ath_attach interface_id 0
[*06/08/2020 05:16:36.4799] Chip id: 0xb, chip version: 0x1000000
[*06/08/2020 05:16:36.4799]
[*06/08/2020 05:16:36.4799] Target Version is 1000000
[*06/08/2020 05:16:36.4799]
[*06/08/2020 05:16:36.4799] Flash Download Address c0000
[*06/08/2020 05:16:36.4799] ol_transfer_bin_file: flash data file defined
[*06/08/2020 05:16:36.4799] ol_transfer_bin_file[3796] Get Caldata for wifi0.
[*06/08/2020 05:16:36.4799] __adf_os_fs_read[42], Open File /tmp/wifi0.caldata SUCCESS!!
[*06/08/2020 05:16:36.4799] file system magic:16914836
[*06/08/2020 05:16:36.4799] super blocksize:4096
[*06/08/2020 05:16:36.4799] inode 1823
[*06/08/2020 05:16:36.4799] file size:12064
[*06/08/2020 05:16:36.4799] qc98xx_verify_checksum: flash checksum passed: 0xa95c
[*06/08/2020 05:16:36.4799] ol_transfer_bin_file 3857: Download Flash data len 12064
[*06/08/2020 05:16:36.4999]
[*06/08/2020 05:16:36.4999] Board data initialized
[*06/08/2020 05:16:36.4999] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:36.5199] ol_ath_download_firmware :First OTP download and Execute is good address:0x5800 return param 4660
[*06/08/2020 05:16:36.5199] ol_ath_download_firmware:##Board Id 22 , CHIP Id 0
[*06/08/2020 05:16:36.5199]
[*06/08/2020 05:16:36.5199] wifi0: Selecting board data file name boardData_Crete_Indoor_2G_neg_pwr.bin
[*06/08/2020 05:16:36.5199] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=IPQ4019/hw.1/boardData_Crete_Indoor_2G_neg_pwr.bin
[*06/08/2020 05:16:36.5199] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:36.5399] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:36.5499]
[*06/08/2020 05:16:36.5499] [Flash] : Ignore Module param
[*06/08/2020 05:16:36.5499] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*06/08/2020 05:16:36.5499] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:36.5599] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:36.5599] ol_transfer_bin_file: Downloading firmware file: IPQ4019/hw.1/athwlan.bin
[*06/08/2020 05:16:36.5699] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.7899] HTC Rx: insufficient length, got:4 expected =8
[*06/08/2020 05:16:37.7899] Startup Mode-0 set
[*06/08/2020 05:16:37.7899] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/08/2020 05:16:37.7999] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/08/2020 05:16:37.7999] Firmware_Build_Number:70
[*06/08/2020 05:16:37.7999] num_rf_chain:0x00000002 ht_cap_info:0x0000085b vht_cap_info:0x339959b2 vht_supp_mcs:0x0000fffa
[*06/08/2020 05:16:37.7999]
[*06/08/2020 05:16:37.7999] RES CFG Support wmi_service_bitmap 9778
[*06/08/2020 05:16:37.7999]
[*06/08/2020 05:16:37.7999] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*06/08/2020 05:16:37.7999] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*06/08/2020 05:16:37.7999] ol_ath_service_ready_event[4268] WAPI MBSSID 0
[*06/08/2020 05:16:37.8399] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/08/2020 05:16:37.8399] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0
[*06/08/2020 05:16:37.8499] spectral_init_netlink 81 NULL SKB
[*06/08/2020 05:16:37.8499] ACS not enabled
[*06/08/2020 05:16:37.8499] ol_ath_thermal_mitigation_attach: --
[*06/08/2020 05:16:37.8499] ol_ath_ahb_probe
[*06/08/2020 05:16:37.8499] ol_ath_ahb_probe: io resource start: 0xa800000, mem=0xc3c00000
[*06/08/2020 05:16:37.8499]
[*06/08/2020 05:16:37.8499] __ol_ath_attach() Allocated scn b66804c0
[*06/08/2020 05:16:37.8499] ol_ath_ahb_configure: MSI addr: 0b006040, MSI base: 00000050
[*06/08/2020 05:16:37.8699]
[*06/08/2020 05:16:37.8699] ol_ath_ahb_configure : num_desired MSI set to 0
[*06/08/2020 05:16:37.8699]
[*06/08/2020 05:16:37.8699] Using Legacy Interrupt
[*06/08/2020 05:16:37.8699]
[*06/08/2020 05:16:37.8699] Waiting for target init
[*06/08/2020 05:16:37.8699]
[*06/08/2020 05:16:37.8699] Done waiting
[*06/08/2020 05:16:37.8799] ol_ath_attach interface_id 1
[*06/08/2020 05:16:37.8799] Chip id: 0xb, chip version: 0x1000000
[*06/08/2020 05:16:37.8799]
[*06/08/2020 05:16:37.8799] Target Version is 1000000
[*06/08/2020 05:16:37.8799]
[*06/08/2020 05:16:37.8799] Flash Download Address c0000
[*06/08/2020 05:16:37.8799] ol_transfer_bin_file: flash data file defined
[*06/08/2020 05:16:37.8799] ol_transfer_bin_file[3796] Get Caldata for wifi1.
[*06/08/2020 05:16:37.8799] __adf_os_fs_read[42], Open File /tmp/wifi1.caldata SUCCESS!!
[*06/08/2020 05:16:37.8799] file system magic:16914836
[*06/08/2020 05:16:37.8799] super blocksize:4096
[*06/08/2020 05:16:37.8799] inode 7307
[*06/08/2020 05:16:37.8799] file size:12064
[*06/08/2020 05:16:37.8799] qc98xx_verify_checksum: flash checksum passed: 0x14b7
[*06/08/2020 05:16:37.8799] ol_transfer_bin_file 3857: Download Flash data len 12064
[*06/08/2020 05:16:37.8999]
[*06/08/2020 05:16:37.8999] Board data initialized
[*06/08/2020 05:16:37.8999] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.9199] ol_ath_download_firmware :First OTP download and Execute is good address:0x5c00 return param 4660
[*06/08/2020 05:16:37.9199] ol_ath_download_firmware:##Board Id 23 , CHIP Id 0
[*06/08/2020 05:16:37.9199]
[*06/08/2020 05:16:37.9199] wifi1: Selecting board data file name boardData_Crete_Indoor_5G_neg_pwr.bin
[*06/08/2020 05:16:37.9199] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=IPQ4019/hw.1/boardData_Crete_Indoor_5G_neg_pwr.bin
[*06/08/2020 05:16:37.9199] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.9399] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.9599]
[*06/08/2020 05:16:37.9599] [Flash] : Ignore Module param
[*06/08/2020 05:16:37.9599] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*06/08/2020 05:16:37.9599] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.9599] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:37.9699] ol_transfer_bin_file: Downloading firmware file: IPQ4019/hw.1/athwlan.bin
[*06/08/2020 05:16:37.9699] Firmware loaded from user helper succesfully
[*06/08/2020 05:16:38.7899] FWLOG: [100567] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:38.7899] FWLOG: [100567] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:38.7899] FWLOG: [100567] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:38.7899] FWLOG: [100567] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:39.1899] HTC Rx: insufficient length, got:4 expected =8
[*06/08/2020 05:16:39.1999] Startup Mode-0 set
[*06/08/2020 05:16:39.1999] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/08/2020 05:16:39.1999] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/08/2020 05:16:39.1999] Firmware_Build_Number:70
[*06/08/2020 05:16:39.1999] num_rf_chain:0x00000002 ht_cap_info:0x0000085b vht_cap_info:0x339959b2 vht_supp_mcs:0x0000fffa
[*06/08/2020 05:16:39.1999]
[*06/08/2020 05:16:39.1999] RES CFG Support wmi_service_bitmap 9778
[*06/08/2020 05:16:39.1999]
[*06/08/2020 05:16:39.1999] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*06/08/2020 05:16:39.1999] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*06/08/2020 05:16:39.1999] ol_ath_service_ready_event[4268] WAPI MBSSID 0
[*06/08/2020 05:16:39.2399] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/08/2020 05:16:39.2399] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 1
[*06/08/2020 05:16:39.2499] acfg_attach: Offload using existing sock be7e4c00
[*06/08/2020 05:16:39.2499] spectral_init_netlink 81 NULL SKB
[*06/08/2020 05:16:39.2499] ACS not enabled
[*06/08/2020 05:16:39.2599] ol_ath_thermal_mitigation_attach: --
[*06/08/2020 05:16:39.3299] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*06/08/2020 05:16:39.3299] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*06/08/2020 05:16:40.1899] FWLOG: [102004] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:40.1899] FWLOG: [102004] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:40.1899] FWLOG: [102004] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:40.1999] FWLOG: [102004] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/08/2020 05:16:40.1999] FWLOG: [102014] WAL_DBGID_PDEV_INFO_PRINT ( 0x3a, 0x10, 0x0, 0x10, 0x0 )
[*06/08/2020 05:16:42.2499]
[*06/08/2020 05:16:42.2499] Click sched monitor: schedulers = 3
[*06/08/2020 05:16:42.9699] click-config/io-real.click:372: While configuring 'todev_wired0 :: ToDevice':
[*06/08/2020 05:16:42.9699] warning: device 'wired0' is down
[*06/08/2020 05:16:43.0099] click-config/io-real.click:372: While configuring 'fromdev_wired0 :: FromDevice':
[*06/08/2020 05:16:43.0099] warning: device 'wired0' is down
[*06/08/2020 05:16:43.9599] click-config/capwap.linuxmodule.template:1161: While initializing 'FromHost@1142 :: FromHost':
[*06/08/2020 05:16:43.9599] no element named '$2'
[*06/08/2020 05:16:43.9599] click-config/io-real.click:372: While initializing 'tohost_wired0 :: ToHost':
[*06/08/2020 05:16:43.9599] warning: device 'wired0' is down
[*06/08/2020 05:16:44.5099] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*06/08/2020 05:16:44.5099] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*06/08/2020 05:16:44.8799] In write handler 'run' for 'set_dns_filtering :: Script':
[*06/08/2020 05:16:44.8799] no element named 'cli_h/content_filter/filter'
[*06/08/2020 05:16:45.2199] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down
[*06/08/2020 05:16:45.2499] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up
[*06/08/2020 05:16:45.2599] ip6_port srcr6, ip6local fe80::3e41:eff:fee3:29b8, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac)
[*06/08/2020 05:16:47.3199] ethernet_port wired0, ip 10.5.0.100, netmask 255.255.0.0, gw 10.5.0.254, mtu 1500, bcast 10.5.255.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[ OK ] Started Cisco Tam service.
Starting Cisco Tam service...
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
Starting Cisco klogd...
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting Cisco printkd...
Starting WCPD process...
Starting DNSmasq...
Starting AP Trace daemon...
Starting DHCPv6 client...
Starting gRPC server daemon...
Starting Cisco rtd service...
Starting Fast CGI daemon...
Starting Hostapd process...
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting Cisco kexec...
Starting Lighttpd Daemon...
Starting Cisco led service...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting capwapd...
Starting OpenSSH server daemon...
Starting Clean Air daemon...
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco led service.
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco klogd.
[ OK ] Started DNSmasq.
[ OK ] Started AP Trace daemon.
[ OK ] Started Cisco rtd service.
[ OK ] Started Fast CGI daemon.
[ OK ] Started DHCPv6 client.
[ OK ] Started Hostapd process.
[ OK ] Started Lighttpd Daemon.
[ OK ] Started WCPD process.
[ OK ] Started Clean Air daemon.
[*06/08/2020 05:16:53.7999] pid 4639's current affinity mask: f
[*06/08/2020 05:16:53.7999] pid 4639's new affinity mask: e
[ OK ] Started capwapd.
[*06/08/2020 05:16:55.7899] chpasswd: password for user changed
[*06/08/2020 05:16:56.0499] 2020-06-08 05:16:56 app 'capwapd' is not registered
[*06/08/2020 05:16:56.0499] init_tam_services: ERROR initializing tam services context ...
[*06/08/2020 05:16:56.0499]
[*06/08/2020 05:16:56.0499] Failed to initialize Crypto.
[*06/08/2020 05:16:57.2199] WCP: Opening /tmp/var/platform/board_name failed!
[*06/08/2020 05:16:57.2199] DOT11_TXP[1]:Domain configured: 23 class:K

[*06/08/2020 05:16:57.6899] Error: Socket open failed


User Access Verification
Username: [*06/08/2020 05:16:58.1699] WCP: Opening /tmp/var/platform/board_name failed!
[*06/08/2020 05:16:58.1699] DOT11_TXP[0]:Domain configured: 1 class:E
[*06/08/2020 05:16:58.5699] Error: Socket open failed
[*06/08/2020 05:16:58.8499] DOT11_DRV[1]: Init Radio1
[*06/08/2020 05:16:58.8999] DOT11_DRV[1]: Stop Radio1 - Begin
[*06/08/2020 05:16:58.9099] DOT11_DRV[1]: set_channel Channel set to 36
[*06/08/2020 05:16:58.9099] WCP: Opening /click/cwx1/radio_stats/vap_chan_util_stats_support failed!
[*06/08/2020 05:16:58.9399] DOT11_DRV[0]: Init Radio0
[*06/08/2020 05:16:58.9899] DOT11_DRV[0]: Stop Radio0 - Begin
[*06/08/2020 05:16:58.9999] DOT11_DRV[0]: set_channel Channel set to 6
[*06/08/2020 05:16:58.9999] WCP: Opening /click/cwx0/radio_stats/vap_chan_util_stats_support failed!
[*06/08/2020 05:16:59.1599] DOT11_CFG[0] Radio Mode is changed from Local to Local
[*06/08/2020 05:16:59.1599] DOT11_CFG[1] Radio Mode is changed from Local to Local
[*06/08/2020 05:16:59.1999] DOT11_DRV[0]: set_channel Channel set to 1
[*06/08/2020 05:16:59.1999] DOT11_DRV[0]: Channel set to 1, width 20
[*06/08/2020 05:16:59.1999] DOT11_DRV[0]: Channel set to 1, width 20
[*06/08/2020 05:16:59.2199] DOT11_DRV[1]: set_channel Channel set to 36
[*06/08/2020 05:16:59.2199] DOT11_DRV[1]: Channel set to 36, width 20
[*06/08/2020 05:16:59.2399] DOT11_DRV[1]: Channel set to 36, width 20
[*06/08/2020 05:17:00.2999] ipv6 gw config loop in capwap main
[*06/08/2020 05:17:01.5099] starting tam services using ACT2...
[*06/08/2020 05:17:01.5099]
[*06/08/2020 05:17:01.5099] TAM init done
[*06/08/2020 05:17:02.2999] ipv6 gw config loop in capwap main
[*06/08/2020 05:17:04.2999] ipv6 gw config loop in capwap main
[*06/08/2020 05:17:06.2999] ipv6 gw config loop in capwap main
[*06/08/2020 05:17:08.2999] ipv6 gw config loop in capwap main
[*06/08/2020 05:17:09.3099] DOT11_CFG[0] Radio Mode is changed from Local to Local
[*06/08/2020 05:17:09.3099] DOT11_CFG[1] Radio Mode is changed from Local to Local
[*06/08/2020 05:17:09.3199] AP IPv4 Address updated from 0.0.0.0 to 10.5.0.100
[*06/08/2020 05:17:09.3299] send CAPWAP ctrl msg to the socket: Socket operation on non-socket
[*06/08/2020 05:17:09.3399] send_msg_to_capwap_sm: Capwap SM restart message send failed for message: 9
[*06/08/2020 05:17:09.3399] dtls_enable_sudi: Unable to load RSA SUDI private key reference
[*06/08/2020 05:17:09.3399] dtls_init: Unable to load SUDI certificate
[*06/08/2020 05:17:09.3499] dtls_init: Use MIC certificate
[*06/08/2020 05:17:09.3499]
[*06/08/2020 05:17:09.3499] CAPWAP State: Init
[*06/08/2020 05:17:09.3499]
[*06/08/2020 05:17:09.3499] PNP is not required,
[*06/08/2020 05:17:09.3499] Starting CAPWAP discovery
[*06/08/2020 05:17:09.3499]
[*06/08/2020 05:17:09.3499]
[*06/08/2020 05:17:09.3499] CAPWAP State: Discovery
[*06/08/2020 05:17:09.3799] Discovery Request sent to 192.168.19.20, discovery type STATIC_CONFIG(1)
[*06/08/2020 05:17:09.3899] Discovery Request sent to 192.168.19.20, discovery type STATIC_CONFIG(1)
[*06/08/2020 05:17:09.3899] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*06/08/2020 05:17:09.3899]
[*06/08/2020 05:17:09.3899] CAPWAP State: Discovery
[*06/08/2020 05:17:12.6499] time="2020-06-08T05:17:12Z" level=info msg="[WATCHDOG] opened systemd socket successfully "
[*06/08/2020 05:17:12.7399] device aptrace0 entered promiscuous mode
[*06/08/2020 05:17:12.8099] device to_container entered promiscuous mode
[*06/08/2020 05:17:19.7599] ipv6 gw config loop in discovery timer expiry
[*06/08/2020 05:17:21.7599] ipv6 gw config loop in discovery timer expiry
[*06/08/2020 05:17:23.7599] ipv6 gw config loop in discovery timer expiry
[*06/08/2020 05:17:25.7599] ipv6 gw config loop in discovery timer expiry
[*06/08/2020 05:17:27.7599] ipv6 gw config loop in discovery timer expiry
[*06/08/2020 05:17:29.7599] ipv6 gw config loop in Ac discovery
[*06/08/2020 05:17:31.7599] ipv6 gw config loop in Ac discovery
[*06/08/2020 05:17:33.7599] ipv6 gw config loop in Ac discovery
[*06/08/2020 05:17:34.7199] ipv6 gw config loop in set IPv4 addr task
[*06/08/2020 05:17:35.7599] ipv6 gw config loop in Ac discovery

 

 

Can you move your post to a new thread? Gets confusing when there might be different issues.
-Scott
*** Please rate helpful posts ***

dmontoya2
Level 1
Level 1

Hello, how did you solve this problem? it's happening to me.. 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card