01-29-2022 07:03 AM - edited 01-29-2022 07:06 AM
Hello
Try in me little Office to setup two AP2802, one as WLC+AP the other as normal AP
that will by member of this discussed here, yes this AP reset now meny time and
setup, but without Success. this AP running also as "Primary Controller"
i see the SSID for short time, and after this the SSID disapair and the front LED
flashing Green Blue Red. About the manual i understod that indicate "Access
point location command invoked from controller web interface"
yes the mobility Express are installed and the Antennas will but up,
-->State of 802.11b Network............... Enabled
-->State of 802.11a Network............... Enabled
please how i can go forrward to fix this. yes i think the AP try
to connect/Search any WLC, but here in the location, this adidional
WLC Controller will not be installed. the Idea are to run only this
two AP2802.
thanks for any possible help, thanks
BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled
General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.40
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED
____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **
U-Boot 2013.01-gcb01933d4 (Nov 10 2020 - 23:41:12) SDK version: 2015_T2.0p10
Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB
RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0
Map: Code: 0x3fed8000:0x3ffae360
BSS: 0x3ffefe24
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)
Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 6273845 (0x005fbb35)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2021-03-04 11:15:15 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 6272837 Bytes = 6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4202632 Bytes = 4 MiB
Image 1: 2054051 Bytes = 2 MiB
Image 2: 16137 Bytes = 15.8 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x025f787c
Loading Multi-File Image ... OK
OK
reserving fdt memory region: addr=0 size=4000
Loading Device Tree to 01ff9000, end 01ffff08 ... OK
Starting Device Tree update ('fdt_skip_update' = no)
Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful
Starting kernel ...
[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1025868K/1048576K available (5743K kernel code, 411K rwdata, 2476K rodata, 359K init, 496K bss, 22708K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:01.4300] buginf tty flushing thread started, ttyport=bf354800
[01/01/1970 00:00:01.5500] m25p80 spi1.0: found mx25l3206, expected n25q032
[01/01/1970 00:00:02.6500] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:02.7935] buginf() enabled.
[*01/01/1970 00:00:02.8032] Made it into bootsh: Mar 4 2021 10:13:22 T-0b7bc0faa97ae8a26ea605c7622aac357397184c-g0b7bc0fa-aut
[*01/01/1970 00:00:12.9757] bootsh mini ramfs booted /bootpart/part1/ramfs_data_cisco.cpio.lzma
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.
[*01/01/1970 00:00:38.9938] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:38.9969] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:39.0484] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:39.0515] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Reached target Timers.
[ OK ] Created slice -.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Listening on udev Kernel Socket.
[ OK ] Listening on udev Control Socket.
[ OK ] Reached target Sockets.
[ OK ] Created slice system.slice.
Starting udev Coldplug all Devices...
[ OK ] Reached target Slices.
Starting udev Kernel Device Manager...
Starting Cisco UBIFS reformat/mount...
[ OK ] Created slice system-serial\x2dgetty.slice.
[ OK ] Started udev Kernel Device Manager.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco seed generation...
Starting Cisco fips check...
Starting Cisco platform file generation...
Starting Cisco system time setup...
[ OK ] Started Cisco seed generation.
[*11/22/2019 23:59:59.0969] Last reload time: Jan 29 14:00:34 2022
[*01/29/2022 14:00:34.0003] Setting system time Sat Jan 29 14:00:34 UTC 2022
[ OK ] Started Cisco system time setup.
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco platform file generation.
Starting Cisco btldr service...
[*01/29/2022 14:00:35.1132] GCM-128 POST passed
[*01/29/2022 14:00:35.1133] GCM-256 POST passed
[ OK ] Started udev Coldplug all Devices.
[ OK ] Started Cisco btldr service.
[ OK ] Reached target Local File Systems.
Starting Security Auditing Service...
[*01/29/2022 14:00:36.7226] parameter passed without an option given
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
Starting Cisco pkg install service...
Starting Cisco S10 boot service...
Starting Cisco act2 check...
[ OK ] Started Security Auditing Service.
[01/29/2022 14:00:38.2300] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
[01/29/2022 14:00:38.3100] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
[ OK ] Started Cisco pkg install service.
[01/29/2022 14:00:44.9200] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[01/29/2022 14:00:45.0000] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[ OK ] Started Cisco act2 check.
[*01/29/2022 14:00:37.3332] 2
[*01/29/2022 14:00:37.6018] Active version: 8.10.151.0
[*01/29/2022 14:00:37.6049] Backup version: 0.0.0.0
[*01/29/2022 14:00:37.9849] device wired0 entered promiscuous mode
[*01/29/2022 14:00:38.3955] wifi0: Initializing TX ring
[*01/29/2022 14:00:38.3984] wifi0: Initializing RX ring
[*01/29/2022 14:00:38.4030] wifi0: prepare firmware downloading
[*01/29/2022 14:00:39.2334] wifi0: Firmware downloading
[*01/29/2022 14:00:40.2057]
[*01/29/2022 14:00:40.2057] Authenticating ACT2 ID:AP2800
[*01/29/2022 14:00:40.2057] Authenticating SN:FOC23430WWY
[*01/29/2022 14:00:40.2068]
[*01/29/2022 14:00:40.2068] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/29/2022 14:00:40.2068]
[*01/29/2022 14:00:40.2132] Seeding /dev/urandom from ACT2
[*01/29/2022 14:00:40.7551] 0;0;<30>systemd[1]: Started Cisco pkg install service.
[*01/29/2022 14:00:41.7408] Reading ACT2 SUDI certificates
[*01/29/2022 14:00:41.9231] 0;0;0;0;0;
[*01/29/2022 14:00:44.4231] Firmware download complete
[*01/29/2022 14:00:44.6231] wifi0: Getting HW specs. Retrying for 3
[*01/29/2022 14:00:44.6234] Mac_Init
[*01/29/2022 14:00:44.6238] Preparing to set HW specs
[*01/29/2022 14:00:44.6240] FIPS enc aes-ccmp Verified
[*01/29/2022 14:00:44.6242] FIPS dec aes-ccmp Verified
[*01/29/2022 14:00:44.6243] FIPS enc aes-ccmp-256 Verified
[*01/29/2022 14:00:44.6244] FIPS dec aes-ccmp-256 Verified
[*01/29/2022 14:00:44.6245] FIPS enc aes-gcmp Verified
[*01/29/2022 14:00:44.6246] FIPS dec aes-gcmp Verified
[*01/29/2022 14:00:44.6247] FIPS enc aes-gcmp-256 Verified
[*01/29/2022 14:00:44.6248] FIPS dec aes-gcmp-256 Verified
[*01/29/2022 14:00:45.0897] wifi1: Initializing TX ring
[*01/29/2022 14:00:45.0932] wifi1: Initializing RX ring
[*01/29/2022 14:00:45.0978] wifi1: prepare firmware downloading
[*01/29/2022 14:00:45.9192] wifi1: Firmware downloading
[*01/29/2022 14:00:47.1371] 0;0;0;0;0;0;0;
[*01/29/2022 14:00:50.3531] Firmware download complete
[*01/29/2022 14:00:50.5531] wifi1: Getting HW specs. Retrying for 3
[*01/29/2022 14:00:50.5534] Mac_Init
[*01/29/2022 14:00:50.5538] Preparing to set HW specs
[*01/29/2022 14:00:50.5540] FIPS enc aes-ccmp Verified
[*01/29/2022 14:00:50.5541] FIPS dec aes-ccmp Verified
[*01/29/2022 14:00:50.5542] FIPS enc aes-ccmp-256 Verified
[*01/29/2022 14:00:50.5543] FIPS dec aes-ccmp-256 Verified
[*01/29/2022 14:00:50.5544] FIPS enc aes-gcmp Verified
[*01/29/2022 14:00:50.5546] FIPS dec aes-gcmp Verified
[*01/29/2022 14:00:50.5547] FIPS enc aes-gcmp-256 Verified
[*01/29/2022 14:00:50.5548] FIPS dec aes-gcmp-256 Verified
[*01/29/2022 14:00:51.6339] Last reload reason : 1: reload command
[ OK ] Started Cisco S10 boot service.
Starting Cisco nolan service...
Starting Cisco watchdog...
Starting Cisco nss service...
[*01/29/2022 14:00:54.0884] Initializing NSS Firmware
[ OK ] Started Cisco nolan service.
[ OK ] Started Cisco watchdog.
Starting Cisco nolan USB service...
[ OK ] Started Cisco nolan USB service.
[ OK ] Started Cisco pre-PoE negotiation.
Starting Cisco pre-PoE negotiation...
[ OK ] Started Cisco nss service.
Starting Cisco S15platform...
Starting Cisco Kclick...
[01/29/2022 14:00:57.6700] Disabling lock debugging due to kernel taint
[ OK ] Started Cisco S15platform.
[ OK ] Started Cisco Kclick.
Starting Cisco ME service...
Starting Cisco certificate create service...
[*01/29/2022 14:00:57.8792] stile module dp init successfully
[*01/29/2022 14:00:57.8793] NBAR Label:BLD_POLARIS_DEV_LATEST_20200414_053707 Module timestamp: Mar 4 2021 at 10:02:28 User: ttaichol
Starting Cisco Kclick...
Starting Cisco Sku service...
[ OK ] Started Cisco Sku service.
[*01/29/2022 14:01:00.9094] SKU to radio FW
[*01/29/2022 14:01:01.0433] wifi2 no private ioctls.
[*01/29/2022 14:01:01.0433]
[*01/29/2022 14:01:01.1897] Create symlink /dev/mic_cert result 0
[*01/29/2022 14:01:01.1897] Loading certificates from storage...
[*01/29/2022 14:01:01.2244] barbados /tmp/SC4_1dbm.txt
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco [01/29/2022 14:01:01.5100] xt_CONNSECMARK: Unknown symbol nf_ct_l3proto_module_put (err 0)
certificate crea[01/29/2022 14:01:01.6200] xt_CONNSECMARK: Unknown symbol xt_register_target (err 0)
te service.
[01/29/2022 14:01:01.7200] xt_CONNSECMARK: Unknown symbol nf_ct_l3proto_try_module_get (err 0)
[01/29/2022 14:01:01.8400] xt_CONNSECMARK: Unknown symbol xt_unregister_target (err 0)
Starting Cisco certtime service.[01/29/2022 14:01:01.9600] xt_SECMARK: Unknown symbol xt_register_target (err 0)
..
[01/29/2022 14:01:02.0600] xt_SECMARK: Unknown symbol xt_unregister_target (err 0)
[ OK ] Started Cisco Tam service.
Starting Cisco Tam service...
[ OK ] Started Cisco Kclick.
Starting Cisco syslog service...
Starting rsyslog client...
Starting Cisco S16platfomm...
[ OK ] Started Cisco syslog service.
[ OK ] Started rsyslog client.
[ OK ] Started Cisco S16platfomm.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
Starting WCPD process...
Starting Cisco brain service...
[*01/29/2022 14:01:07.2795] starting tam services using ACT2...
[*01/29/2022 14:01:07.2795] TAM init done
[*01/29/2022 14:01:07.6431] Click sched monitor: schedulers = 1
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting Cisco image/firmware updater service...
Starting Cisco printkd...
Starting AP Trace daemon...
Starting OpenSSH server daemon...
Starting Marvell Forwarding daemon...
Starting gRPC server daemon...
Starting Cisco led service...
Starting Cisco rtd service...
Starting Cisco klogd...
Starting Fast CGI daemon...
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting Cisco kexec...
Starting capwapd...
Starting Clean Air daemon...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting Hostapd process...
[ OK ] Started Cisco image/firmware updater service.
[ OK ] Started Cisco led service.
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco klogd.
[ OK ] Started AP Trace daemon.
[ OK ] Started Cisco rtd service.
[ OK ] Started Fast CGI daemon.
[ OK ] Started OpenSSH server daemon.
[ OK ] Started Hostapd process.
[ OK ] Started Cisco brain service.
[01/29/2022 14:01:11.2600] wired0 emac 2: link up
[01/29/2022 14:01:11.3100] wired0: link up
User Access Verification
[01/29/2022 14:01:21.1400] wired0 emac 2: link up
[01/29/2022 14:01:21.1900] wired0: link up
[*01/29/2022 14:01:21.4967]
[*01/29/2022 14:01:21.4967] !!!!! {/opt/cisco/bin/capwap_brain} failed writing /click/vrrp_elector/preferred_ap_name len 0 data: ""
[*01/29/2022 14:01:21.8157] ip6_port srcr2, ip6local fe80::3e51:eff:fe4e:d0de, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac)
[*01/29/2022 14:01:22.5174] pid 7553's current affinity mask: 3
[*01/29/2022 14:01:22.5174] pid 7553's new affinity mask: 1
[*01/29/2022 14:01:23.1132] device aptrace0 entered promiscuous mode
[*01/29/2022 14:01:23.1632] device to_container entered promiscuous mode
[*01/29/2022 14:01:23.6988] chpasswd: password for user changed
[*01/29/2022 14:01:24.0388] DOT11_TXP[1]:Domain configured: 12 class:E
[*01/29/2022 14:01:24.4839] DOT11_TXP[2]:Domain configured: 12 class:E
[*01/29/2022 14:01:24.9348] DOT11_TXP[2]:Domain configured: 1 class:E
[*01/29/2022 14:01:25.0198] DOT11_TXP[0]:Domain configured: 12 class:E
[*01/29/2022 14:01:25.4935] DOT11_TXP[0]:Domain configured: 1 class:E
[*01/29/2022 14:01:26.4126] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:26.4432] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 6
[*01/29/2022 14:01:27.4505] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:27.4781] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:28.0946] DOT11_CFG[0] Radio Mode is changed from Local to FlexConnect
[*01/29/2022 14:01:28.1052] DOT11_CFG[0]: Starting radio 0
[*01/29/2022 14:01:28.1328] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 6
[*01/29/2022 14:01:28.7684] chatter: wl0: Beacon rate info: Previous: 0 Current: 252183808
[*01/29/2022 14:01:28.7684] chatter: wl0: Beacon PID : Previous: 0 Current: 8
[*01/29/2022 14:01:28.7836] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:28.7843] DOT11_CFG[1] Radio Mode is changed from Local to FlexConnect
[*01/29/2022 14:01:28.7849] DOT11_CFG[1]: Starting radio 1
[*01/29/2022 14:01:28.8131] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:28.8620] ethernet_port wired0, ip 192.168.1.72, netmask 255.255.255.0, gw 192.168.1.1, mtu 1500, bcast 192.168.1.255, dns1 192.168.1.9, dns2 185.42.245.139, domain caloro.m, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*01/29/2022 14:01:29.4638] chatter: wl1: Beacon rate info: Previous: 0 Current: 252183808
[*01/29/2022 14:01:29.4639] chatter: wl1: Beacon PID : Previous: 0 Current: 8
[*01/29/2022 14:01:29.4794] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:30.5818] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:30.6061] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:30.6334] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:31.2785] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:32.2879] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:32.3128] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:32.3401] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:32.9777] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:32.9934] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:33.0191] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:33.0465] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:33.6930] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:35.0641] bftype is 6
[*01/29/2022 14:01:35.1705] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:35.1956] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:35.3426] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:36.0987] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:37.1205] DOT11_DRV[0]: Stopped Radio 0
[*01/29/2022 14:01:37.1449] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:37.2916] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*01/29/2022 14:01:38.0490] DOT11_DRV[0]: Started Radio 0
[*01/29/2022 14:01:39.4396] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:39.4641] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:39.4917] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:40.1413] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:41.1969] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:41.2218] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:41.2497] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:41.8959] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:42.9251] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:42.9495] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:42.9773] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:43.6428] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:43.6582] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:43.6828] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:43.7105] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:44.3598] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:45.9445] bftype is 6
[*01/29/2022 14:01:46.0530] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:46.0778] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:46.3831] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:47.2997] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:48.3367] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:48.3613] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:48.6830] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:49.6050] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:50.6342] DOT11_DRV[1]: Stopped Radio 1
[*01/29/2022 14:01:50.6587] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:50.9648] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 36
[*01/29/2022 14:01:51.8976] DOT11_DRV[1]: Started Radio 1
[*01/29/2022 14:01:51.9737] Socket Valid Element wcp/wcp_db Handler set_vlan_name_map Data Length 10
[*01/29/2022 14:01:51.9747] Failed to send msg to wcp/Radio2.set_radius_extended_config
[*01/29/2022 14:01:51.9747]
[*01/29/2022 14:01:52.9437] AP IPv4 Address updated from 0.0.0.0 to 192.168.1.72
[*01/29/2022 14:02:05.1583] chatter: tohost_virtual :: ToHost: device 'virtual' went down
[*01/29/2022 14:02:05.2470] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down
[*01/29/2022 14:02:05.2969] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down
[*01/29/2022 14:02:05.3475] chatter: tohost_vlan2 :: ToHost: device 'vlan2' went down
[*01/29/2022 14:02:05.3772] chatter: tohost_vlan3 :: ToHost: device 'vlan3' went down
[*01/29/2022 14:02:05.4272] chatter: tohost_vlan4 :: ToHost: device 'vlan4' went down
[*01/29/2022 14:02:05.4571] chatter: tohost_vlan5 :: ToHost: device 'vlan5' went down
[*01/29/2022 14:02:05.5168] chatter: tohost_vlan6 :: ToHost: device 'vlan6' went down
[*01/29/2022 14:02:05.5475] chatter: tohost_vlan7 :: ToHost: device 'vlan7' went down
[*01/29/2022 14:02:05.5872] chatter: tohost_vlan8 :: ToHost: device 'vlan8' went down
[*01/29/2022 14:02:05.6273] chatter: tohost_vlan9 :: ToHost: device 'vlan9' went down
[*01/29/2022 14:02:05.6672] chatter: tohost_vlan10 :: ToHost: device 'vlan10' went down
[*01/29/2022 14:02:05.7174] chatter: tohost_vlan1Starting the Switchdriver...
Starting Switchdriver...
Cryptographic library self-test....
Testing SHA1 Short Message 1
Testing SHA256 Short Message 1
Testing SHA384 Short Message 1
SHA1 POST PASSED
Testing HMAC SHA1 Short Message 1
Testing HMAC SHA2 Short Message 1
Testing HMAC SHA384 Short Message 1
passed!
XML config selected
Starting SSHD: ok
Starting Redis-Server: ok
Starting naconnector: ok
Starting nginx: ok
Validating XML configuration
Starting NA Connector...
creating logs dir
Starting DB Services...
Cisco is a trademark of Cisco Systems, Inc.
Software Copyright Cisco Systems, Inc. All rights reserved.
Cisco AireOS Version 8.10.151.0
Initializing OS Services: ok
Initializing Serial Services: ok
Initializing Network Services: ok
Starting Statistics Service: ok
Unable to open dx flag file
Starting ARP Services: ok
Starting Trap Manager: ok
Starting Data Externalization services: ok
Starting Network Interface Management Services: ok
Starting System Services: ok
Starting SNMP services: ok
Starting Fastpath Hardware Acceleration: Starting Switching Services: ok
Starting QoS Services: ok
Starting Policy Manager: ok
Starting Data Transport Link Layer: ok
Starting Access Control List Services: ok
Starting System Interfaces: sh: write error: Broken pipe
ok
Starting Client Troubleshooting Service: ok
Starting Certificate Database: Initializing Curl Globally..
ok
Starting VPN Services: ok
Starting Management Frame Protection: ok
Starting DNS Services: ok
Starting Secure Tunnelling Services: ok
ok
Starting LWAPP: ok
Starting CAPWAP: ok
Starting LOCP: ok
Starting Security Services: ok
Starting OpenDNS Services: ok
Starting Policy Manager: ok
Starting Authentication Engine: ok
Starting Mobility Management: ok
Starting Capwap Ping Component: ok
Starting AVC Services: ok
Starting AVC Flex Services: ok
Starting Virtual AP Services: ok
Starting AireWave Director: open rrm: not able to ipv4 by pass rule ok
Starting Network Time Services: ok
Starting Cisco Discovery Protocol: ok
Starting Broadcast Services: ok
Starting Logging Services: ok
Starting DHCP Server: ok
Starting IDS Signature Manager: ok
Starting RFID Tag Tracking: ok
Starting RF Profiles: ok
Starting Mesh Services: ok
Starting TSM: ok
Starting CIDS Services: ok
Starting DTLS server: enabled in CAPWAP
Starting CleanAir: ok
Starting WIPS: ok
Starting SSHPM LSC PROV LIST: ok
Starting RRC Services: ok
Starting Alarm Services: ok
Starting FMC HS: ok
Starting FLEXEXPRESS ConfigSync Task: ok
Starting Hotspot Services: ok
Starting HTTP Image Download Task: ok
Starting Tunnel Services New: ok
Starting mDNS Services: ok
Starting Management Services:
Starting IPSec Profiles component: ok
Web Server: CLI: Secure Web: ok
(Cisco Controller)
Enter User Name (or 'Recover-Config' this one-time only to reset configuration to factory defaults)
User:
Solved! Go to Solution.
01-29-2022 07:59 AM
Is the connected switch capable of providing 30watts per port (802.3at aka POE+ or 802.3bt aka uPOE)? If there is no sufficient power provided to the AP, it will reduce it's abilities.
01-29-2022 07:59 AM
- Could you login to the (controller)-ap and issue show logging , just after boot ?
M.
01-29-2022 07:59 AM
Is the connected switch capable of providing 30watts per port (802.3at aka POE+ or 802.3bt aka uPOE)? If there is no sufficient power provided to the AP, it will reduce it's abilities.
01-30-2022 12:35 AM
Hello and thanks for your fast feedback, iam not shure, but i think its realy a problem about POE Power.
think i need to buy the original poe supply "air-pwrinj6=" so that i can gi shure.
so hopfull the led Grenn-Blue-Red will be disapair.
also what iam not found was the console from "(Cisco Controller)>" to me lovley console "# "
regards
---
spamApTask0: Jan 30 09:19:36.560: a0:b4:39:80:4d:60 Unable to get Ap mode in Join request
*apfReceiveTask: Jan 30 09:19:36.564: Failed sending message WLAN_BANDWIDTH_CONFIG to Wlan Rate Limiting Task
*apfReceiveTask: Jan 30 09:19:36.564: a0:b4:39:80:4d:60 Incorrect message is being sent to AP :192:168:1:89 (5272) by Controller: 192:168:1:100 (5246) Not posting onto message qu eue
*apfReceiveTask: Jan 30 09:19:36.564: Failed sending message WLAN_BANDWIDTH_CONFIG to Wlan Rate Limiting Task
*apfReceiveTask: Jan 30 09:19:36.564: a0:b4:39:80:4d:60 Incorrect message is being sent to AP :192:168:1:89 (5272) by Controller: 192:168:1:100 (5246) Not posting onto message qu eue
*spamApTask0: Jan 30 09:19:41.715: tlvDecodePhyHECapPayload1 slotId=0 bandId=0 heCapable=0
heSuBF=0 heMuBF=0
heMbssidCap=0 heMbssidMAX=0 heAmpduTidBmap=0 heCapTxRxMcsNss=0
*spamApTask0: Jan 30 09:19:41.715: tlvDecodePhyHECapPayload2 heOpMcsNssSet[0]=0 heOpMcsNssSet[1]=0
heOpVhtOpInfo[0]=0, heOpVhtOpInfo[1]=0 heOpVhtOpInfo[2]=0
*spamApTask0: Jan 30 09:19:41.715: tlvDecodePhyHECapPayload1 slotId=1 bandId=1 heCapable=0
heSuBF=0 heMuBF=0
heMbssidCap=0 heMbssidMAX=0 heAmpduTidBmap=0 heCapTxRxMcsNss=0
*spamApTask0: Jan 30 09:19:41.715: tlvDecodePhyHECapPayload2 heOpMcsNssSet[0]=0 heOpMcsNssSet[1]=0
heOpVhtOpInfo[0]=0, heOpVhtOpInfo[1]=0 heOpVhtOpInfo[2]=0
*spamApTask0: Jan 30 09:19:42.951: a0:b4:39:80:4d:60 Wlan Rate Limiting Timeout Config 30 Capwap message sent to AP
*spamApTask0: Jan 30 09:19:42.951: send phy ht info config in acSendRemainingConfigToAP slot 1
--
*fp_main_task: Jan 30 08:56:39.433: %CNFGR-3-INV_COMP_ID: cnfgr.c:4326 Invalid Component Id : Unrecognized (45) in cfgConfiguratorInit
--
Port Summary
STP Admin Physical Physical Link Link
Pr Type Stat Mode Mode Status Status Trap POE
-- ------- ---- ------- ---------- ---------- ------ ------- ---------
1 Normal Forw Enable Auto 1000 Full Up Enable N/A
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide