09-01-2020 12:55 PM - edited 07-05-2021 12:27 PM
Dear All,
I have AP's on the same subnet of the controller, however the AP is not able to join the controller although it is pingable from the WLC and and it gets its IP from DHCP properly, I have the following logs, please help!
spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 Discovery Request from 172.31.1.155:34238
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 137, MaxLicense=137 joined Aps =25
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 apType = 39 apModel: AIR-CAP2702I-E-K9
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 apType: Ox27 bundleApImageVer: 8.5.161.0
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 version:8 release:5 maint:161 build:0
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 Discovery Response sent to 172.31.1.155 port 34238
*spamApTask2: Sep 01 20:03:59.831: e0:0e:da:e4:e8:50 Discovery Response sent to 172.31.1.155:34238
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 Discovery Request from 172.31.1.155:34238
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 137, MaxLicense=137 joined Aps =25
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 apType = 39 apModel: AIR-CAP2702I-E-K9
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 apType: Ox27 bundleApImageVer: 8.5.161.0
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 version:8 release:5 maint:161 build:0
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 Discovery Response sent to 172.31.1.155 port 34238
*spamApTask2: Sep 01 20:03:59.832: e0:0e:da:e4:e8:50 Discovery Response sent to 172.31.1.155:34238
************************************************************************************
*spamApTask6: Sep 01 22:11:59.534: 00:62:ec:59:75:e0 Releasing WTP
*spamApTask2: Sep 01 22:14:40.118: e0:0e:da:28:5b:c4 Deleting AP 172.31.1.179 which has not been plumbed
*************************************************************************************8
*************************************************************************************
*spamApTask0: Sep 01 21:57:32.256: <<<< Start of CAPWAP Packet >>>>
*spamApTask0: Sep 01 21:57:32.256: CAPWAP Control mesg Recd from 172.31.1.177, Port 34238
*spamApTask0: Sep 01 21:57:32.256: HLEN 4, Radio ID 0, WBID 1
*spamApTask0: Sep 01 21:57:32.256: Msg Type : CAPWAP_DISCOVERY_REQUEST
*spamApTask0: Sep 01 21:57:32.256: Msg Length : 165
*spamApTask0: Sep 01 21:57:32.256: Msg SeqNum : 0
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_DISCOVERY_TYPE, Length 1
*spamApTask0: Sep 01 21:57:32.256: Discovery Type : CAPWAP_DISCOVERY_TYPE_UNKNOWN
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_WTP_BOARD_DATA, Length 62
*spamApTask0: Sep 01 21:57:32.256: Vendor Identifier : 0x00409600
*spamApTask0: Sep 01 21:57:32.256: WTP_SERIAL_NUMBER : AIR-CAP2702I-E-K9
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_WTP_DESCRIPTOR, Length 40
*spamApTask0: Sep 01 21:57:32.256: Maximum Radios Supported : 2
*spamApTask0: Sep 01 21:57:32.256: Radios in Use : 2
*spamApTask0: Sep 01 21:57:32.256: Encryption Capabilities : 0x00 0x01
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_WTP_FRAME_TUNNEL, Length 1
*spamApTask0: Sep 01 21:57:32.256: WTP Frame Tunnel Mode : NATIVE_FRAME_TUNNEL_MODE
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_WTP_MAC_TYPE, Length 1
*spamApTask0: Sep 01 21:57:32.256: WTP Mac Type : SPLIT_MAC
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
*spamApTask0: Sep 01 21:57:32.256: Vendor Identifier : 0x00409600
*spamApTask0: Sep 01 21:57:32.256:
IE : UNKNOWN IE 207
*spamApTask0: Sep 01 21:57:32.256: IE Length : 4
*spamApTask0: Sep 01 21:57:32.256: Decode routine not available, Printing Hex Dump
*spamApTask0: Sep 01 21:57:32.256: 00000000: 01 00 00 01 ....
*spamApTask0: Sep 01 21:57:32.256:
*spamApTask0: Sep 01 21:57:32.256: Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 22
*spamApTask0: Sep 01 21:57:32.256: Vendor Identifier : 0x00409600
*spamApTask0: Sep 01 21:57:32.256:
IE : RAD_NAME_PAYLOAD
*spamApTask0: Sep 01 21:57:32.256: IE Length : 16
*spamApTask0: Sep 01 21:57:32.256: Rad Name :
*spamApTask0: Sep 01 21:57:32.256: APe00e.da28.5bc4
*spamApTask0: Sep 01 21:57:32.256: <<<< End of CAPWAP Packet >>>>
************************************************************************
09-01-2020 03:16 PM
Console into the AP and reboot the AP.
Post the entire boot-up process.
09-02-2020 01:26 AM
I am far from the AP, will let you know once I can get the boot process.
09-02-2020 12:14 AM
- Check ap-model , versus controller-model constraints with :
https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html
M.
09-02-2020 01:25 AM
I checked the software it is compatible with the AP model, any other suggestion ?
09-02-2020 03:37 AM
- You will need the output from the complete boot process as Leo suggested,
M.
09-02-2020 04:55 AM
Dear All,
The problem was MIC expired on the 29th of August unlucky, I had disabled it and now everything is working fine.
Thank you all.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: