cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2091
Views
5
Helpful
6
Replies

Cisco 1562i becoming a WLC even after a factory reset

key_tone_9926
Level 1
Level 1

I have a 1562i that was configured with mobility express as a WLC. I have now did a factory reset as i now want it to join as an AP to an existing network running mobility express 8.10.151.0.

 

When i add the static ip addres to the AP and give it the I address of the WLC for it to talk to. After the reboot of the capwap  it boots back up in to the WLC configure on the AP so it is working as a WLC and not as a AP. 

 

Below is the image type and AP config;

 

AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : NOT ME OR EWC-AP CAPABLE

 

Any help you can give that would allow me to set it to stop booting up as a WLC and allow it to join another WLC would be much appreciated.

 

Many thanks in advance

1 Accepted Solution

Accepted Solutions

Please configure the ME WLC with initial setup and make sure it is accessible from the Gateway. Then issue the command ap-type capwap, then it will reboot in to CAPWAP.

View solution in original post

6 Replies 6

Sandeep Choudhary
VIP Alumni
VIP Alumni

Hi,

To reset the AP into CAPWAP mode you’ll need to enter enable mode on the CLI and enter the “ap-type capwap” command.

Just connect with console or login via IP and type this command, and enter:

 

1562#ap-type capwap

 

It will reboot and then try to join other ME WLC in your network as subordinate AP.

 

Regards

Dont forget to arte helpful posts

Arshad Safrulla
VIP Alumni
VIP Alumni

Hi,

 

As per the below output, even though the Access Point has the Cisco Mobility Express image, it is configured to run as a CAPWAP Access Point. In this case Access Point will not run the controller function and will not participate in the Master Election process upon failure of the active Master AP.

 

AP Image type : MOBILITY EXPRESS IMAGE
AP Configuration : NOT ME OR EWC-AP CAPABLE

 

Th problem could be something else, can you connect your console to the AP and post the output while trying to join the other ME WLC? Also make sure that this AP is upgraded to match the new ME WLC AP image or you need to host the AP images in a TFTP root folder and configure the new ME WLC to serve the images to the AP's trying to join him. 

ME WLC's itself doesn't hold any AP images because it doesn't have the resources like physical WLC's. If you need to configure the new ME WLC for AP image management you can follow the below link.

https://www.wiresandwi.fi/blog/cisco-mobility-express-image-management-using-tftp-server

 

 

Hi below is the output from the console after reboot and trying to join to the WLC. 

 

 

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.40
High speed PHY - Version: 2.0
BoardId = 0x23board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-gcb01933d4 (Nov 10 2020 - 23:41:12) SDK version: 2015_T2.0p10

Board: Milos
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae360
BSS: 0x3ffefe24
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
SFP not detected, enable RJ45
Net: , egiga1 [PRIME]
Hit ESC key to stop autoboot: 3  2  1  0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 6273845 (0x005fbb35)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2021-03-04 11:15:15 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 6272837 Bytes = 6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4202632 Bytes = 4 MiB
Image 1: 2054051 Bytes = 2 MiB
Image 2: 16137 Bytes = 15.8 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x025f787c
Loading Multi-File Image ... OK
OK
reserving fdt memory region: addr=0 size=4000
Loading Device Tree to 01ff9000, end 01ffff08 ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1025868K/1048576K available (5743K kernel code, 411K rwdata, 2476K rodata, 359K init, 496K bss, 22708K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:01.4300] buginf tty flushing thread started, ttyport=bf2b6800
[01/01/1970 00:00:01.5500] m25p80 spi1.0: found mx25l3206, expected n25q032
[*01/01/1970 00:00:02.6273] buginf() enabled.
[*01/01/1970 00:00:02.6369] Made it into bootsh: Mar 4 2021 10:13:22 T-0b7bc0faa97ae8a26ea605c7622aac357397184c-g0b7bc0fa-aut
[*01/01/1970 00:00:12.8911] bootsh mini ramfs booted /bootpart/part1/ramfs_data_cisco.cpio.lzma

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.


This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.

[*01/01/1970 00:00:38.8182] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:38.8213] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:38.8605] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:38.8635] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Reached target Timers.
[ OK ] Created slice -.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Listening on udev Control Socket.
[ OK ] Created slice system.slice.
Starting Cisco UBIFS reformat/mount...
[ OK ] Reached target Slices.
[ OK ] Created slice system-serial\x2dgetty.slice.
[ OK ] Listening on udev Kernel Socket.
Starting udev Kernel Device Manager...
Starting udev Coldplug all Devices...
[ OK ] Reached target Sockets.
[ OK ] Started udev Kernel Device Manager.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco platform file generation...
Starting Cisco fips check...
Starting Cisco seed generation...
Starting Cisco system time setup...
[ OK ] Started Cisco system time setup.
[ OK ] Started Cisco seed generation.
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco platform file generation.
Starting Cisco btldr service...
[*03/25/2018 23:59:59.0876] Last reload time: Sep 23 13:21:00 2021
[*09/23/2021 13:21:00.0054] Setting system time Thu Sep 23 13:21:00 UTC 2021
[*09/23/2021 13:21:01.1563] GCM-128 POST passed
[*09/23/2021 13:21:01.1563] GCM-256 POST passed
[ OK ] Started udev Coldplug all Devices.
[ OK ] Started Cisco btldr service.
[ OK ] Reached target Local File Systems.
Starting Cisco act2 check...
Starting Cisco pkg install service...
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
Starting Security Auditing Service...
[*09/23/2021 13:21:03.0058] parameter passed without an option given
Starting Cisco S10 boot service...
[ OK ] Started Security Auditing Service.
[09/23/2021 13:21:04.5100] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
[09/23/2021 13:21:04.5900] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
[ OK ] Started Cisco pkg install service.
[09/23/2021 13:21:08.5500] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[09/23/2021 13:21:08.6300] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[ OK ] Started Cisco act2 check.
[ OK ] Started Cisco S10 boot service.
Starting Cisco nolan service...
Starting Cisco nss service...
[*09/23/2021 13:21:03.3465] /etc/init.d/S10boot: Warning: deleting backup ap images to save storage...
[*09/23/2021 13:21:03.4049] 1
[*09/23/2021 13:21:03.7674] Active version: 8.10.151.0
[*09/23/2021 13:21:03.7802] Backup version: 0.0.0.0
[*09/23/2021 13:21:04.1542]
[*09/23/2021 13:21:04.1542] led pattern module start
[*09/23/2021 13:21:04.2796] device wired0 entered promiscuous mode
[*09/23/2021 13:21:04.6775] wifi0: Initializing TX ring
[*09/23/2021 13:21:04.6809] wifi0: Initializing RX ring
[*09/23/2021 13:21:04.6859] wifi0: prepare firmware downloading
[*09/23/2021 13:21:05.3395]
[*09/23/2021 13:21:05.3395]
[*09/23/2021 13:21:05.3395]
[*09/23/2021 13:21:05.3395]
[*09/23/2021 13:21:05.3395] Authenticating ACT2 ID:AP1560
[*09/23/2021 13:21:05.3395] Authenticating SN:FOC22110xxx
[*09/23/2021 13:21:05.3401]
[*09/23/2021 13:21:05.3401] (ACT2Boot) Hardware is Cisco (c) authentic
[*09/23/2021 13:21:05.3401]
[*09/23/2021 13:21:05.3466] Seeding /dev/urandom from ACT2
[*09/23/2021 13:21:05.5117] wifi0: Firmware downloading
[*09/23/2021 13:21:06.9557] Reading ACT2 SUDI certificates
[*09/23/2021 13:21:06.9806] 0;0;<30>systemd[1]: Started Cisco pkg install service.
[*09/23/2021 13:21:08.0491] 0;
[*09/23/2021 13:21:08.0531] Firmware download complete
[*09/23/2021 13:21:08.2451] wifi0: Getting HW specs. Retrying for 3
[*09/23/2021 13:21:08.2454] Mac_Init
[*09/23/2021 13:21:08.2458] Preparing to set HW specs
[*09/23/2021 13:21:08.2461] FIPS enc aes-ccmp Verified
[*09/23/2021 13:21:08.2462] FIPS dec aes-ccmp Verified
[*09/23/2021 13:21:08.2463] FIPS enc aes-ccmp-256 Verified
[*09/23/2021 13:21:08.2464] FIPS dec aes-ccmp-256 Verified
[*09/23/2021 13:21:08.2465] FIPS enc aes-gcmp Verified
[*09/23/2021 13:21:08.2466] FIPS dec aes-gcmp Verified
[*09/23/2021 13:21:08.2467] FIPS enc aes-gcmp-256 Verified
[*09/23/2021 13:21:08.2468] FIPS dec aes-gcmp-256 Verified
[*09/23/2021 13:21:08.7248] wifi1: Initializing TX ring
[*09/23/2021 13:21:08.7282] wifi1: Initializing RX ring
[*09/23/2021 13:21:08.7328] wifi1: prepare firmware downloading
[*09/23/2021 13:21:09.5572] wifi1: Firmware downloading
[*09/23/2021 13:21:10.7771] 0;0;0;0;0;0;0;
[*09/23/2021 13:21:13.9611] Firmware download complete
[*09/23/2021 13:21:14.1551] wifi1: Getting HW specs. Retrying for 3
[*09/23/2021 13:21:14.1555] Mac_Init
[*09/23/2021 13:21:14.1558] Preparing to set HW specs
[*09/23/2021 13:21:14.1560] FIPS enc aes-ccmp Verified
[*09/23/2021 13:21:14.1562] FIPS dec aes-ccmp Verified
[*09/23/2021 13:21:14.1563] FIPS enc aes-ccmp-256 Verified
[*09/23/2021 13:21:14.1564] FIPS dec aes-ccmp-256 Verified
[*09/23/2021 13:21:14.1565] FIPS enc aes-gcmp Verified
[*09/23/2021 13:21:14.1566] FIPS dec aes-gcmp Verified
[*09/23/2021 13:21:14.1567] FIPS enc aes-gcmp-256 Verified
[*09/23/2021 13:21:14.1568] FIPS dec aes-gcmp-256 Verified
[*09/23/2021 13:21:15.2334] Last reload reason : 0: unknown
[*09/23/2021 13:21:15.4002] Initializing NSS Firmware
Starting Cisco watchdog...
[ OK ] Started Cisco nolan service.
[ OK ] Started Cisco nss service.
[ OK ] Started Cisco watchdog.
Starting Cisco S15platform...
Starting Cisco Kclick...
[ OK ] Started Cisco pre-PoE negotiation.
Starting Cisco pre-PoE negotiation...
[09/23/2021 13:21:19.1800] Disabling lock debugging due to kernel taint
[ OK ] Started Cisco S15platform.
[ OK ] Started Cisco Kclick.
Starting Cisco Kclick...
Starting Cisco Sku service...
[*09/23/2021 13:21:19.3920] stile module dp init successfully
[*09/23/2021 13:21:19.3921] NBAR Label:BLD_POLARIS_DEV_LATEST_20200414_053707 Module timestamp: Mar 4 2021 at 10:02:28 User: ttaichol
[*09/23/2021 13:21:22.0491] SKU to radio FW
[*09/23/2021 13:21:22.1263] wifi2 no private ioctls.
[*09/23/2021 13:21:22.1263]
Starting Cisco certificate create service...
Starting Cisco ME service...
[ OK ] Started Cisco Sku service.
[09/23/2021 13:21:22.7000] xt_CONNSECMARK: Unknown symbol nf_ct_l3proto_module_put (err 0)
[09/23/2021 13:21:22.8000] xt_CONNSECMARK: Unknown symbol xt_register_target (err 0)
[09/23/2021 13:21:22.8900] xt_CONNSECMARK: Unknown symbol nf_ct_l3proto_try_module_get (err 0)
[09/23/2021 13:21:22.9900] xt_CONNSECMARK: Unknown symbol xt_unregister_target (err 0)
[ OK [09/23/2021 13:21:23.1100] xt_SECMARK: Unknown symbol xt_register_target (err 0)
] Started Cisco [09/23/2021 13:21:23.2100] xt_SECMARK: Unknown symbol xt_unregister_target (err 0)
certificate create service.
[ OK ] Started Cisco Kclick.
Starting Cisco syslog service...
[*09/23/2021 13:21:23.0891] Create symlink /dev/mic_cert result 0
[*09/23/2021 13:21:23.0891] Loading certificates from storage...
[*09/23/2021 13:21:23.1174] milos /tmp/SC4_1dbm.txt
Starting Cisco S16platfomm...
Starting rsyslog client...
Starting Cisco certtime service...
[ OK ] Started Cisco Tam service.
Starting Cisco Tam service...
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco syslog service.
[ OK ] Started Cisco S16platfomm.
[ OK ] Started rsyslog client.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[* ] A start job is running for Cisco certtime service (32s / 1min 26s) [** ] A start job is running for Cisco certtime service (33s / 1min 26s) [ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting gRPC server daemon...
Starting Cisco image/firmware updater service...
Starting Marvell Forwarding daemon...
[*09/23/2021 13:21:28.9080] starting tam services using ACT2...
[*09/23/2021 13:21:28.9080]
[*09/23/2021 13:21:28.9080] TAM init done
[*09/23/2021 13:21:29.1651]
[*09/23/2021 13:21:29.1651] Click sched monitor: schedulers = 1
Starting Cisco rtd service...
Starting OpenSSH server daemon...
Starting Cisco klogd...
Starting Cisco kexec...
Starting Cisco led service...
Starting Cisco brain service...
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting Cisco printkd...
Starting capwapd...
Starting WCPD process...
Starting AP Trace daemon...
Starting Hostapd process...
Starting Fast CGI daemon...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting Clean Air daemon...
[ OK ] Started Cisco image/firmware updater service.
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco led service.
[ OK ] Started Cisco klogd.
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco rtd service.
[ OK ] Started AP Trace daemon.
[ OK ] Started Fast CGI daemon.
[ OK ] Started Hostapd process.
[ OK ] Started Cisco brain service.
[09/23/2021 13:21:33.1400] wired0 emac 1: link up
[09/23/2021 13:21:33.1900] wired0: link up
[ OK ] Started OpenSSH server daemon.

 

User Access Verification
Username: [09/23/2021 13:21:38.9800] wired0 emac 1: link up
[09/23/2021 13:21:39.0300] wired0: link up
[*09/23/2021 13:21:39.1998]
[*09/23/2021 13:21:39.1998] !!!!! {/opt/cisco/bin/capwap_brain} failed writing /click/vrrp_elector/preferred_ap_name len 0 data: ""
[*09/23/2021 13:21:39.7544] ip6_port srcr2, ip6local fe80::3a0e:4dff:febf:c374, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac)
[*09/23/2021 13:21:40.0092] pid 7326's current affinity mask: 3
[*09/23/2021 13:21:40.0092] pid 7326's new affinity mask: 1
[*09/23/2021 13:21:40.3884] device aptrace0 entered promiscuous mode
[*09/23/2021 13:21:40.4253] device to_container entered promiscuous mode
[*09/23/2021 13:21:40.8657] ethernet_port wired0, ip 10.1.1.44, netmask 255.255.255.0, gw 10.1.1.3, mtu 1500, bcast 10.1.1.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*09/23/2021 13:21:41.5960] chpasswd: password for user changed
[*09/23/2021 13:21:42.2469] DOT11_TXP[2]:Domain configured: 1 class:E
[*09/23/2021 13:21:42.3924] DOT11_TXP[2]:Domain configured: 12 class:E
[*09/23/2021 13:21:44.4898] DOT11_TXP[1]:Domain configured: 12 class:E
[*09/23/2021 13:21:44.9295] DOT11_TXP[0]:Domain configured: 1 class:E
[*09/23/2021 13:21:45.0947] DOT11_TXP[0]:Domain configured: 12 class:E
[*09/23/2021 13:21:46.0529] AP IPv4 Address updated from 0.0.0.0 to 10.1.1.44
[*09/23/2021 13:21:46.0614] send CAPWAP ctrl msg to the socket: Socket operation on non-socket
[*09/23/2021 13:21:48.1249] DOT11_DRV[1]: Stopped Radio 1
[*09/23/2021 13:21:48.1538] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:49.0930] DOT11_DRV[0]: Stopped Radio 0
[*09/23/2021 13:21:49.1220] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 6
[*09/23/2021 13:21:50.0101] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*09/23/2021 13:21:50.6654] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*09/23/2021 13:21:50.6862] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*09/23/2021 13:21:51.6739] bftype is 6
[*09/23/2021 13:21:51.7011] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*09/23/2021 13:21:52.4739] DOT11_DRV[0]: DOT11_DRV[0]: set_channel Channel set to 1
[*09/23/2021 13:21:52.6408] failed wlconfig_commit netdev = wifi1
[*09/23/2021 13:21:52.6409] Error for wireless request "Commit changes" (8B00) :
[*09/23/2021 13:21:52.6410] SET failed on device wifi1 ; Operation not permitted.
[*09/23/2021 13:21:52.9912] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:53.6500] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:54.3002] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:54.3210] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:55.3573] bftype is 6
[*09/23/2021 13:21:55.3845] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:56.1727] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:21:56.9538] DOT11_DRV[1]: DOT11_DRV[1]: set_channel Channel set to 100
[*09/23/2021 13:22:17.2416]
[*09/23/2021 13:22:17.2416] !!!!! {/opt/cisco/bin/capwap_brain} failed writing /click/host_firewall_ssh/switch len 1 data: "0"
[*09/23/2021 13:22:17.3291] chatter: tohost_virtual :: ToHost: device 'virtual' went down
[*09/23/2021 13:22:17.3890] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down
[*09/23/2021 13:22:17.4192] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down
[*09/23/2021 13:22:17.4692] chatter: tohost_vlan2 :: ToHost: device 'vlan2' went down
[*09/23/2021 13:22:17.4992] chatter: tohost_vlan3 :: ToHost: device 'vlan3' went down
[*09/23/2021 13:22:17.5392] chatter: tohost_vlan4 :: ToHost: device 'vlan4' went down
[*09/23/2021 13:22:17.5792] chatter: tohost_vlan5 :: ToHost: device 'vlan5' went down
[*09/23/2021 13:22:17.6192] chatter: tohost_vlan6 :: ToHost: device 'vlan6' went down
[*09/23/2021 13:22:17.6692] chatter: tohost_vlan7 :: ToHost: device 'vlan7' went down
[*09/23/2021 13:22:17.7090] chatter: tohost_vlan8 :: ToHost: device 'vlan8' went down
[*09/23/2021 13:22:17.7590] chatter: tohost_vlan9 :: ToHost: device 'vlan9' went down
[*09/23/2021 13:2Starting the Switchdriver...
Starting Switchdriver...

Cryptographic library self-test....
Testing SHA1 Short Message 1
Testing SHA256 Short Message 1
Testing SHA384 Short Message 1
SHA1 POST PASSED
Testing HMAC SHA1 Short Message 1
Testing HMAC SHA2 Short Message 1
Testing HMAC SHA384 Short Message 1
passed!

XML config selected
Starting SSHD: ok
Starting Redis-Server: ok
Starting naconnector: ok
Starting nginx: ok
Starting NA Connector...
Validating XML configuration
creating logs dir
Starting DB Services...
Cisco is a trademark of Cisco Systems, Inc.
Software Copyright Cisco Systems, Inc. All rights reserved.

Cisco AireOS Version 8.10.151.0
Initializing OS Services: ok
Initializing Serial Services: ok
Initializing Network Services: ok
Starting PNP: ok
Starting Statistics Service: ok
Unable to open dx flag file
Starting ARP Services: ok
Starting Trap Manager: ok

Starting Data Externalization services: ok
Starting Network Interface Management Services: ok
Starting System Services: ok
Starting SNMP services: ok
Starting Fastpath Hardware Acceleration: Starting Switching Services: ok
Starting QoS Services: ok
Starting Policy Manager: ok
Starting Data Transport Link Layer: ok
Starting Access Control List Services: ok
Starting System Interfaces: ok
Starting Client Troubleshooting Service: ok
Starting Certificate Database: Initializing Curl Globally..
ok
Starting VPN Services: ok
Starting Management Frame Protection: ok
Starting DNS Services: ok
Starting Secure Tunnelling Services: ok
ok
Starting LWAPP: ok
Starting CAPWAP: ok
Starting LOCP: ok
Starting Security Services: ok
Starting OpenDNS Services: ok
Starting Policy Manager: ok
Starting Authentication Engine: ok
Starting Capwap Ping Component: ok
Starting AVC Services: ok
Starting AVC Flex Services: ok
Starting Virtual AP Services: ok
Starting AireWave Director: open rrm: not able to ipv4 by pass rule ok
Starting Network Time Services: ok
Starting Cisco Discovery Protocol: ok
Starting Broadcast Services: ok
Starting Logging Services: ok
Starting DHCP Server: ok
Starting IDS Signature Manager: ok
Starting RFID Tag Tracking: ok
Starting RF Profiles: ok
Starting Mesh Services: ok
Starting TSM: ok
Starting CIDS Services: ok
Starting DTLS server: enabled in CAPWAP

In hreapLoadConfig. Loading config has failed. loading default config
Starting CleanAir: ok
Starting WIPS: ok
Starting SSHPM LSC PROV LIST: ok
Starting RRC Services: ok
Starting Alarm Services: ok
Starting FMC HS: ok
Starting FLEXEXPRESS ConfigSync Task: ok
Starting HTTP Image Download Task: ok
Starting Tunnel Services New: ok
Starting mDNS Services: ok
Starting Management Services:
Starting IPSec Profiles component: ok
Web Server: CLI: Secure Web: ok

Enabling Controller Provisioning

Hostname is not compliant to RFC !.
Hostname can contain max of 31 characters namely Upper/lowercase letters,digits,dot,hyphen.
Hostname should always start with an alphabet or digit and should not end with '.' or '-'.
PnP config is saved to storage

Configuring management interface

Arshad Safrulla
VIP Alumni
VIP Alumni

Did you assign the static IP before the ME converted to capwap or after the capwap conversion?

Can you go through the initial configuration for ME make sure that the AP is reachable from it's gateway and try again to convert it to capwap (ap-type capwap). Once the AP is rebooted you may console in and configure the static IP and direct it to the new ME WLC.

This was suggested to us by Cisco SE while migrating a ME setup (2800) to 9800-CL 

I had  set the the ap-type to capwap. I reloaded the AP. then set the static ip address of the AP and the added the ip address and the the name of the WLC that it would talk to. and it is still doing the same. 

 

I goes through it's boot up sequence in the CLI then it loads in to the initial set up for it to be a WLC. 

It is still the same . 

 

 

Please configure the ME WLC with initial setup and make sure it is accessible from the Gateway. Then issue the command ap-type capwap, then it will reboot in to CAPWAP.

Review Cisco Networking products for a $25 gift card