08-19-2023 03:52 AM
I'm managing a network with 266 of the above WAPs with dual 5520 WLC's. Up until yesterday all WAPs were connected to the controller and everything was humming along nicely. The switch stack that the WLC's connect to had a wobbly and needed to be rebooted. After the reboot I noticed that I had about 10 WAP's not coming back on line. I physcially observed each unit and the LED status is flashing red on all 10 of them.
I took one WAP to the workbench, connected it to the appropriate VLAN (power is via PoE from the switch) connected in over the console with a laptop to see what is going on. I could see it wouldn't connect to the controller and discovery failed unable to open SSH Daemon. The WAP was not getting an IP via DHCP. I assigned a static IP as well as manually configured the primary controller. Below is a snapshot from what happened after that;
[*08/19/2023 09:37:33.6517]
[*08/19/2023 09:37:33.6517] CAPWAP State: Discovery
[*08/19/2023 09:37:33.6517] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:37:33.6617] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:37:33.6617] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*08/19/2023 09:38:03.1125]
[*08/19/2023 09:38:03.1125] CAPWAP State: Discovery
[*08/19/2023 09:38:03.1125] Discovery failed 5 times. Check Release/Renew DHCP AP CAPWAP MODE:[1] controller previously connected:[0]
[*08/19/2023 09:38:03.1125] CAPWAPd forces DHCP restart.
[*08/19/2023 09:38:03.1225] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:38:03.1225] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*08/19/2023 09:38:22.5664] WTP IP address changed from 0.0.0.0 to 10.61.XX.XX, restart CAPWAP.
[*08/19/2023 09:38:22.5664]
[*08/19/2023 09:38:22.5664]
[*08/19/2023 09:38:22.5664] Going to restart CAPWAP (reason : WTP IP address changed)...
[*08/19/2023 09:38:22.5664]
[*08/19/2023 09:38:22.5664] Restarting CAPWAP State Machine.
[*08/19/2023 09:38:22.5664] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*08/19/2023 09:38:22.6064]
[*08/19/2023 09:38:22.6064] CAPWAP State: DTLS Teardown
[*08/19/2023 09:38:22.7564] upgrade.sh: Script called with args:[ABORT]
[*08/19/2023 09:38:22.7964] do ABORT, part2 is active part
[*08/19/2023 09:38:22.8263] upgrade.sh: Cleanup tmp files ...
[*08/19/2023 09:38:22.8563] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4).
[*08/19/2023 09:38:22.8563] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4).
[*08/19/2023 09:38:37.4318]
[*08/19/2023 09:38:37.4318] CAPWAP State: Discovery
[*08/19/2023 09:38:37.4718] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:38:37.4718] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:38:37.4718] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*08/19/2023 09:39:06.9825]
[*08/19/2023 09:39:06.9825] CAPWAP State: Discovery
[*08/19/2023 09:39:06.9925] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:39:06.9925] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*08/19/2023 09:39:07.0225] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
On the WLC under security and AP policies, Accept Manufactured Installed Certificate is selected and nothing else. I have tried manually adding the MAC address of the AP's primary ethernet interface under the AP Authorization list and it's made no difference.
I have noticed that the time on the AP is not the same as the time on the WLC. However, I do not know the command to manually change the time when consoled into the AP. I've ? searched through all the menus and I don't see any option for manually adjusting the time. All the other AP's in the plant have sucessfully come back barring 10 pieces which are all behaving in the same manner. I have taken a spare AP from inventory and connected it in place of one of the units thats not behaving and the new unit connects to the WLC and comes online right away. I have also done a full factory reset on the unit I'm working with on the bench.
08-19-2023 04:00 AM
- As you are already hinting , it seems that the APs are no longer able to discover the controller , check the controller logs too (to prove that e.g.) ; are the APs in the designated vlan and does the untill now controller discovery mechanism still work (preferably dhcp with option 43). Check the DHCP server logs for instance , to see if mac address requests come in from the APs , (or look for incorrect port settings after the 'switch wobble')
M.
08-19-2023 06:11 AM
Did the WLC receive the discovery requests from the AP? Check the AP join statistics and any reason for failure.
The AP gets the time from the first WLC reply so don't worry about that, as long as WLC has correct time.
Failure rate on 18xx APs is much higher than other AP models so these APs may have failed - RMA required. Hardware is more likely to fail after being reloaded or power-cycled.
How are your switch ports configured?
Did you run a packet capture on the switch port to see whether the CAPWAP discovery is even getting there?
One of the symptoms of failed 18xx hardware is that the AP sends an invalid CAPWAP discovery packet (missing full hardware info) so the WLC ignores it.
If you attach the FULL AP console log, from power on, here as a .txt file it may show any hardware failure during startup - eg missing radios. Because you've only quoted a small snippet you might have missed those messages.
08-19-2023 06:58 AM
No, the WLC did not receieve discovery requests from the AP. I just chekced the join statistics. The below is the console log from startup. This is after a factory reset. The WAP proceeds no further and the LED is blinking red. However if I give it a static IP and manually assign the WLC controller then it does join. However, this is not how it's supposed to work. It seems a bit odd that after rebooting a network switch 10 WAPs would develop a hardware failure.
I've not run a packet capture on the swtich port. The CAPWAP discovery process works when an IP is statically assigned. The switch ports are static access, fast ethernet, all WAP ports assigned to the same VLAN. Nothing has changed with respect to the ports from yesterday to today, the only thing that changed was the stack that the WLC's were connected to was rebooted and since then 10 WAP's have failed to come back onlien all exhibiting the same flashing red LED
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part2
Booting from part2
Read 1024 bytes from volume part2 to 45000000
Read 39523628 bytes from volume part2 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment
Starting image ...
[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M usbcore.authorized_default=0 console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:00.2200]
[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
[01/01/1970 00:00:25.7321] ACPU PVS: 1
[01/01/1970 00:00:27.5415] buginf tty flushing thread started, ttyport=eed6ea90
[*01/01/1970 00:00:33.7396] buginf() enabled.
[*01/01/1970 00:00:33.7496] Made it into bootsh: Mar 3 2021 15:40:12 T-0b7bc0faa97ae8a26ea605c7622aac357397184c-g0b7bc0fa-aut
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.
[*01/01/1970 00:00:35.2991] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:35.3091] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:35.3791] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:35.3791] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[ OK ] Created slice -.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Reached target Sockets.
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Reached target Timers.
[ OK ] Created slice system.slice.
Starting Cisco UBIFS reformat/mount...
[ OK ] Created slice system-serial\x2dgetty.slice.
[ OK ] Reached target Slices.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco platform file generation...
Starting Cisco fips check...
Starting Cisco seed generation...
[*01/01/1970 00:00:40.0976] GCM-128 POST passed
[*01/01/1970 00:00:40.0976] GCM-256 POST passed
Starting Cisco system time setup...
[*01/01/1970 00:00:40.3275] Last reload time: Aug 19 10:13:32 2023
[*08/19/2023 10:13:32.0000] Setting system time Sat Aug 19 10:13:32 UTC 2023
[ OK ] Started Cisco platform file generation.
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco seed generation.
[ OK ] Started Cisco system time setup.
[ OK ] Reached target Local File Systems.
Starting Cisco pkg install service...
Starting Cisco S10 boot service...
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
[08/19/2023 10:13:32.0799] sysctl link missing during unregister: /net/ipv4/neigh//eth0
[08/19/2023 10:13:32.3099] sysctl link missing during unregister: /net/ipv4/neigh//eth1
[ OK ] Started Cisco S10 boot service.
Starting Cisco watchdog...
Starting Cisco nss service...
Starting Cisco nolan service...
[*08/19/2023 10:13:33.4595] === 5G radio domain is 41, COPY 5G BDF files from non_ETSI_BDF folder ===
[*08/19/2023 10:13:33.4895] 1
[*08/19/2023 10:13:33.7594] Active version: 8.10.151.0
[*08/19/2023 10:13:33.7694] Backup version: 8.5.151.0
[*08/19/2023 10:13:34.1093]
[*08/19/2023 10:13:34.1093] led pattern module start
[*08/19/2023 10:13:34.1493] AP1852I
[*08/19/2023 10:13:34.2693] nss_driver - Turbo Support 1
[*08/19/2023 10:13:34.2693] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*08/19/2023 10:13:34.3093] NSS firmware booted
[*08/19/2023 10:13:34.3293] NSS firmware booted
[*08/19/2023 10:13:34.4292]
[*08/19/2023 10:13:34.4292] phy_value=0: org="0x1000" phy_reg="0x1800"
[*08/19/2023 10:13:34.8091] Current value of FACTORY_RESET=0
[*08/19/2023 10:13:34.8491] Last reload time: Aug 19 10:13:32 2023
[*08/19/2023 10:13:32.0000] Setting system time Sat Aug 19 10:13:32 UTC 2023
[*08/19/2023 10:13:32.1899] device wired0 entered promiscuous mode
[*08/19/2023 10:13:32.3899] device wired1 entered promiscuous mode
[*08/19/2023 10:13:33.1097] Last reload reason : 0: unknown
[ OK ] Started Cisco watchdog.
[ OK ] Started Cisco nss service.
[ OK ] Started Cisco pkg install service.
[ OK ] Started Cisco nolan service.
Starting Cisco nolan USB service...
Starting Cisco Kclick...
Starting Cisco S15platform...
[ OK ] Started Cisco nolan USB service.
[*08/19/2023 10:13:35.3689] stile module dp init successfully
[*08/19/2023 10:13:35.3689] NBAR Label:BLD_POLARIS_DEV_LATEST_20200414_053707 Module timestamp: Mar 3 2021 at 15:34:28 User: ttaichol
[ OK ] Started Cisco Kclick.
[ OK ] Started Cisco S15platform.
Starting Cisco certificate create service...
Starting Cisco Kclick...
Starting Cisco ME service...
[*08/19/2023 10:13:36.1287] Loading sha2...
[*08/19/2023 10:13:36.1387] Dumpping sha1...
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco Kclick.
Starting rsyslog client...
Starting Cisco S16platfomm...
[*08/19/2023 10:13:36.4586] miibus get eedecc00!
Starting Cisco syslog service...
[ OK ] Started rsyslog client.
[ OK ] Started Cisco S16platfomm.
[ OK ] Started Cisco syslog service.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ OK ] Started Cisco certificate create service.
Starting Cisco certtime service...
[ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting Cisco rtd service...
Starting Clean Air daemon...
Starting Cisco printkd...
Starting Cisco brain service...
[ OK ] Started System Monitor service.
Starting System Monitor service...
[*08/19/2023 10:13:37.3883] Loading MIC cert and key
[*08/19/2023 10:13:37.3983] Dumpping sha2...
[*08/19/2023 10:13:37.5083] pid 2909's current affinity mask: 3
[*08/19/2023 10:13:37.5083] pid 2909's new affinity mask: 1
[*08/19/2023 10:13:38.6479] Loading MIC cert and key
Starting OpenSSH server daemon...
Starting Cisco led service...
Starting gRPC server daemon...
Starting Hostapd process...
Starting Cisco klogd...
[ OK ] Started NSS Firmware Monitor daemon.
Starting NSS Firmware Monitor daemon...
Starting capwapd...
Starting Fast CGI daemon...
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting AP Trace daemon...
Starting WCPD process...
Starting Cisco kexec...
[ OK ] Started Cisco led service.
[ OK ] Started Cisco kexec.
[ OK ] Started OpenSSH server daemon.
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco klogd.
[ OK ] Started Cisco rtd service.
[ OK ] Started Hostapd process.
[ OK ] Started AP Trace daemon.
[ OK ] Started Fast CGI daemon.
[ OK ] Started Cisco brain service.
[*08/19/2023 10:13:42.0868] pid 3018's current affinity mask: 3
[*08/19/2023 10:13:42.0868] pid 3018's new affinity mask: 1
[*08/19/2023 10:13:42.8966] pid 3056's current affinity mask: 3
[*08/19/2023 10:13:42.8966] pid 3056's new affinity mask: 1
[*08/19/2023 10:13:43.9763] pid 3158's current affinity mask: 3
[*08/19/2023 10:13:43.9763] pid 3158's new affinity mask: 1
[*08/19/2023 10:13:44.1062] __mm_init_module
[*08/19/2023 10:13:44.1662]
[*08/19/2023 10:13:44.1662] __ol_ath_attach() Allocated scn edcc0480
[*08/19/2023 10:13:44.1762] ol_ath_attach interface_id 0
[*08/19/2023 10:13:44.1862] Chip id: 0x9, chip version: 0x1000000
[*08/19/2023 10:13:44.1862]
[*08/19/2023 10:13:44.1862] Target Version is 1000000
[*08/19/2023 10:13:44.1862]
[*08/19/2023 10:13:44.1862] Flash Download Address c0000
[*08/19/2023 10:13:44.1862] ol_transfer_bin_file: flash data file defined
[*08/19/2023 10:13:44.1862] Cal location [0]: 00000000
[*08/19/2023 10:13:44.1862]
[*08/19/2023 10:13:44.1862] Wifi0 NAND FLASH Select OFFSET 0x1000
[*08/19/2023 10:13:44.2062] qc98xx_verify_checksum: flash checksum passed: 0x8f8e
[*08/19/2023 10:13:44.2062] ol_transfer_bin_file 3861: Download Flash data len 12064
[*08/19/2023 10:13:44.2262]
[*08/19/2023 10:13:44.2262] Board data initialized
[*08/19/2023 10:13:44.2662] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660
[*08/19/2023 10:13:44.2662] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*08/19/2023 10:13:44.2662] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin
[*08/19/2023 10:13:44.3361]
[*08/19/2023 10:13:44.3361] [Flash] : Ignore Module param
[*08/19/2023 10:13:44.3361] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*08/19/2023 10:13:44.3561] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*08/19/2023 10:13:45.3058]
[*08/19/2023 10:13:45.3058] Click sched monitor: schedulers = 1
[*08/19/2023 10:13:45.4658] HTC Rx: insufficient length, got:4 expected =8
[*08/19/2023 10:13:45.4658] Startup Mode-0 set
[*08/19/2023 10:13:45.4658] HTC Service:0x0300 ep:1 TX flow control disabled
[*08/19/2023 10:13:45.4658] HTC Service:0x0100 ep:2 TX flow control disabled
[*08/19/2023 10:13:45.4658] Firmware_Build_Number:70
[*08/19/2023 10:13:45.4658] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffaa
[*08/19/2023 10:13:45.4658]
[*08/19/2023 10:13:45.4658] RES CFG Support wmi_service_bitmap 9778
[*08/19/2023 10:13:45.4658]
[*08/19/2023 10:13:45.4658] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*08/19/2023 10:13:45.4658] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*08/19/2023 10:13:45.5458] wmi_ready_event_rx: WMI UNIFIED READY event
[*08/19/2023 10:13:45.5458] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0
[*08/19/2023 10:13:45.5458] spectral_init_netlink 81 NULL SKB
[*08/19/2023 10:13:45.5458] ACS not enabled
[*08/19/2023 10:13:45.5458] ol_ath_thermal_mitigation_attach: --
[*08/19/2023 10:13:45.5458]
[*08/19/2023 10:13:45.5458] __ol_ath_attach() Allocated scn ed880480
[*08/19/2023 10:13:45.5658] ol_ath_attach interface_id 1
[*08/19/2023 10:13:45.5658] Chip id: 0x9, chip version: 0x1000000
[*08/19/2023 10:13:45.5658]
[*08/19/2023 10:13:45.5658] Target Version is 1000000
[*08/19/2023 10:13:45.5658]
[*08/19/2023 10:13:45.5658] Flash Download Address c0000
[*08/19/2023 10:13:45.5658] ol_transfer_bin_file: flash data file defined
[*08/19/2023 10:13:45.5658] Cal location [1]: 00004000
[*08/19/2023 10:13:45.5658]
[*08/19/2023 10:13:45.5658] wifi1 NAND FLASH Select OFFSET 0x5000
[*08/19/2023 10:13:45.5858] qc98xx_verify_checksum: flash checksum passed: 0xed26
[*08/19/2023 10:13:45.5858] ol_transfer_bin_file 3861: Download Flash data len 12064
[*08/19/2023 10:13:45.6057]
[*08/19/2023 10:13:45.6057] Board data initialized
[*08/19/2023 10:13:45.6457] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return param 4660
[*08/19/2023 10:13:45.6457] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*08/19/2023 10:13:45.6457] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_5G_v2_007.bin
[*08/19/2023 10:13:45.7157]
[*08/19/2023 10:13:45.7157] [Flash] : Ignore Module param
[*08/19/2023 10:13:45.7157] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*08/19/2023 10:13:45.7357] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*08/19/2023 10:13:46.4655] FWLOG: [57877] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:46.4655] FWLOG: [57877] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:46.4655] FWLOG: [57877] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:46.4655] FWLOG: [57877] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:46.8354] HTC Rx: insufficient length, got:4 expected =8
[*08/19/2023 10:13:46.8454] Startup Mode-0 set
[*08/19/2023 10:13:46.8454] HTC Service:0x0300 ep:1 TX flow control disabled
[*08/19/2023 10:13:46.8454] HTC Service:0x0100 ep:2 TX flow control disabled
[*08/19/2023 10:13:46.8454] Firmware_Build_Number:70
[*08/19/2023 10:13:46.8454] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x0000ffaa
[*08/19/2023 10:13:46.8454]
[*08/19/2023 10:13:46.8454] RES CFG Support wmi_service_bitmap 9778
[*08/19/2023 10:13:46.8454]
[*08/19/2023 10:13:46.8454] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*08/19/2023 10:13:46.8454] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*08/19/2023 10:13:46.9153] wmi_ready_event_rx: WMI UNIFIED READY event
[*08/19/2023 10:13:46.9153] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 1
[*08/19/2023 10:13:46.9153] acfg_attach: Offload using existing sock ecfd8600
[*08/19/2023 10:13:46.9153] spectral_init_netlink 81 NULL SKB
[*08/19/2023 10:13:46.9253] ACS not enabled
[*08/19/2023 10:13:46.9253] ol_ath_thermal_mitigation_attach: --
[*08/19/2023 10:13:46.9853] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*08/19/2023 10:13:46.9853] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*08/19/2023 10:13:47.8450] FWLOG: [59239] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
User Access Verification
Username: [*08/19/2023 10:13:47.8450] FWLOG: [59239] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:47.8450] FWLOG: [59239] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:47.8450] FWLOG: [59239] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 10:13:47.8450] FWLOG: [59247] WAL_DBGID_PDEV_INFO_PRINT ( 0x3a, 0x10, 0x0, 0x10, 0x0 )
[*08/19/2023 10:13:50.1443] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*08/19/2023 10:13:50.1543] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*08/19/2023 10:13:50.6942] ip6_port srcr2, ip6local fe80::272:78ff:fe20:2c78, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac)
[*08/19/2023 10:13:52.2037] pid 4071's current affinity mask: 3
[*08/19/2023 10:13:52.2037] pid 4071's new affinity mask: 1
[*08/19/2023 10:13:52.5036] pid 4081's current affinity mask: 3
[*08/19/2023 10:13:52.5036] pid 4081's new affinity mask: 1
[*08/19/2023 10:13:52.5836] device aptrace0 entered promiscuous mode
[*08/19/2023 10:13:52.6636] device to_container entered promiscuous mode
[*08/19/2023 10:13:53.5433] pid 4122's current affinity mask: 3
[*08/19/2023 10:13:53.5433] pid 4122's new affinity mask: 1
[*08/19/2023 10:13:55.6427] DOT11_TXP[0]:Domain configured: 41 class:B
[*08/19/2023 10:13:55.8526] chpasswd: password for user changed
[*08/19/2023 10:13:56.6323] DOT11_TXP[0]:Domain configured: 0 class:A
[*08/19/2023 10:13:57.0922] DOT11_DRV[0]: Init Radio0
[*08/19/2023 10:13:57.1222] DOT11_DRV[0]: set_channel Channel set to 6
[*08/19/2023 10:13:57.1422] DOT11_DRV[1]: Init Radio1
[*08/19/2023 10:13:57.1822] DOT11_DRV[1]: set_channel Channel set to 36
[*08/19/2023 10:13:58.0219] DOT11_DRV[0]: set_channel Channel set to 1
[*08/19/2023 10:13:58.0319] DOT11_DRV[0]: Channel set to 1, width 20
[*08/19/2023 10:13:58.0419] DOT11_DRV[0]: Channel set to 1, width 20
[*08/19/2023 10:13:58.0519] DOT11_DRV[1]: set_channel Channel set to 36
[*08/19/2023 10:13:58.0619] DOT11_DRV[1]: Channel set to 36, width 20
[*08/19/2023 10:13:58.0619] DOT11_DRV[1]: Channel set to 36, width 20
[*08/19/2023 10:14:36.7498]
[*08/19/2023 10:14:36.7498] phy_value=0: org="0x1800" phy_reg="0x1000"
[*08/19/2023 10:14:36.7498] device wired1 left promiscuous mode
08-19-2023 07:09 AM
>... However if I give it a static IP The CAPWAP discovery process works (summarizing)
- Well then you need to take a step back , check if the normal DHCP address provisioning for the APs still works. Check the DHCP servers logs and or try to ping an AP (on condition that it received an address from the DHCP server)
M.
08-19-2023 06:14 AM
Hi Marce,
Thanks for your speedy reply. The logs on the WLC show all connected AP's are in the correct VLAN, as for checking whether the controller discovery mechanism still works, I connected a WAP from my spares inventory and observed the following
[*05/12/2023 07:42:04.0785] CAPWAP State: Discovery
[*05/12/2023 07:42:04.0785] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*05/12/2023 07:42:04.0885] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
[*05/12/2023 07:42:04.0985] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*05/12/2023 07:42:04.0985]
[*05/12/2023 07:42:04.0985] CAPWAP State: Discovery
[*05/12/2023 07:42:04.0985] Discovery Response from 10.61.XX.XX
[*05/12/2023 07:42:04.1284] Start: RPC thread 1105906832 created.
[*05/12/2023 07:42:04.1984] Discovery Response from 10.61.XX.XX
[*05/12/2023 07:42:04.1984] Discovery Response from 10.61.XX.XX
[*08/19/2023 11:36:32.0000]
[*08/19/2023 11:36:32.0000] CAPWAP State: DTLS Setup
[*08/19/2023 11:36:32.2799]
[*08/19/2023 11:36:32.2799] CAPWAP State: Join
[*08/19/2023 11:36:32.2799] Sending Join request to 10.61.XX.XX through port 5272
[*08/19/2023 11:36:32.2799] Join Response from 10.61.XX.XX
[*08/19/2023 11:36:32.2799] AC accepted join request with result code: 0
[*08/19/2023 11:36:32.2899] Received wlcType 0, timer 30
[*08/19/2023 11:36:32.3999] nss_capwapmgr_enable_tunnel[1664]:ef30e800: tunnel 0 is already enabled
[*08/19/2023 11:36:32.4299]
[*08/19/2023 11:36:32.4299] CAPWAP State: Image Data
[*08/19/2023 11:36:32.4299] AP image version 8.10.151.0 backup 8.5.140.0, Controller 8.10.151.0
[*08/19/2023 11:36:32.4299] Version is the same, do not need update.
[*08/19/2023 11:36:32.4698] upgrade.sh: Script called with args:[NO_UPGRADE]
[*08/19/2023 11:36:32.5098] do NO_UPGRADE, part2 is active part
[*08/19/2023 11:36:32.5098]
[*08/19/2023 11:36:32.5098] CAPWAP State: Configure
[*08/19/2023 11:36:32.6898] Radio [0] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 11:36:32.6898] Radio [1] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 11:36:32.6898] Radio [2] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 11:36:32.7098] DOT11_CFG[0]: Starting radio 0
[*08/19/2023 11:36:32.7398] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 11:36:32.7398] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 11:36:32.7598] DOT11_DRV[0]: Stop Radio0 - Begin
[*08/19/2023 11:36:33.1296] DOT11_DRV[0]: Stop Radio0 - End
[*08/19/2023 11:36:33.1296] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 11:36:33.1296] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 11:36:33.1696] DOT11_CFG[1]: Starting radio 1
[*08/19/2023 11:36:33.1696] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 11:36:33.1696] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 11:36:33.1796] DOT11_DRV[1]: Stop Radio1 - Begin
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Stop Radio1 - End
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Stop Radio1 - Begin
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Stop Radio1 - End
[*08/19/2023 11:36:33.4995] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 11:36:33.5095] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 11:36:34.8591] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:34.8591] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:34.8591] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:34.8591] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:34.8591] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:34.8691] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 11:36:35.7288] Null cert id for TLV_AP_CACERTS_CONFIG_PAYLOAD
[*08/19/2023 11:36:36.5286]
[*08/19/2023 11:36:36.5286] CAPWAP State: Run
[*08/19/2023 11:36:36.5886] AP has joined controller 0511-WLC
[*08/19/2023 11:36:37.1984] DOT11_DRV[0]: Stop Radio0 - Begin
[*08/19/2023 11:36:37.2184] DOT11_DRV[0]: Stop Radio0 - End
[*08/19/2023 11:36:37.2184] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 11:36:37.2184] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 11:36:51.2840] chpasswd: password for user changed
[*08/19/2023 11:36:51.7338] apphost feature is not supported
[*08/19/2023 11:36:52.1237] Got WSA Server config TLVs
[*08/19/2023 11:36:52.9035]
[*08/19/2023 11:36:52.9035] ========== enable_skb_stats_wireless_counters = 1 ==============
[*08/19/2023 11:36:53.7732]
[*08/19/2023 11:36:53.7732] Same LSC mode, no action needed
[*08/19/2023 11:36:55.8825] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=27, NumofPendingMsgs=1
[*08/19/2023 11:36:55.8825]
[*08/19/2023 11:36:59.0216]
[*08/19/2023 11:36:59.0216] phy_value=0: org="0x1800" phy_reg="0x1000"
[*08/19/2023 11:36:59.0315] device wired1 left promiscuous mode
[*08/19/2023 11:37:05.8894] set cleanair [slot0][band0] disable
I can see address requests from the WAP I am working on currently
However, should I connect a laptop to the same switch port that the WAP is currently connected to I get an appropriate IP address for that VLAN, so the DHCP server is issuing IP's. It looks like the controller discovery mechanism might be at fault. Which particular setting would that be?
08-19-2023 10:09 AM
>... I connect a laptop to the same switch port that the WAP is currently connected to I get an appropriate IP address
- I am still not completely convinced , please check that basic network setup can be achieved for your production APs (getting an IP and ping-able) , if they are powered through POE , then that is simple to test by shutting and then 'no shutting' the particular port which leads to a cold start of the AP , then check if it becomes available on the network again (first!)
M.
08-19-2023 10:27 AM
@marce1000 wrote:>... I connect a laptop to the same switch port that the WAP is currently connected to I get an appropriate IP address
- I am still not completely convinced , please check that basic network setup can be achieved for your production APs (getting an IP and ping-able) , if they are powered through POE , then that is simple to test by shutting and then 'no shutting' the particular port which leads to a cold start of the AP , then check if it becomes available on the network again (first!)
Ok I have selected 3 AP's connected to 3 different locations and three separate switches. All three are pingable, I performed a shut and then no shut command on each of the respective ports and all three powered up and came on line.
Added to this the fresh AP I took from spares and connected to the workbench port where I'd been previously working on one of the AP's that were not connecting to the WLC (unless it was statically configured), and that connected right out of the box, receievd an IP via DHCP, saw it pop up on the WLC and was able to connect wireless clients to it. Console log pasted into an earlier post.
08-19-2023 11:38 AM
- Is there anything in the controller logs when a (previous) production AP tries to join ?
M.
08-20-2023 05:29 AM
Nothing I can see. I've disconnected and re-connected another random three again today and nothing for those MAC addresses showing in the logs. They rejoin the controller without issue.
08-20-2023 08:01 AM
- >Nothing I can see. I've disconnected and re-connected another random three again today and nothing for those MAC addresses showing in the logs. They rejoin the controller without issue.
- So you say some can join and some can't ?
M.
08-19-2023 07:31 AM
Hi Marce,
I think the easiest way to check this is with a new out of the packet spare AP, same model as all the others. I've connected a new AP to the working port on the bench, which is configured correctly for an AP on this network. At the risk of spamming this thread with console logs, I've pasted the entire log below from beginning to when the AP is fully attached and joined to the network and I can see in on the WLC. Suffice to say that this WAP connected without a hitch, receieved an IP from the DHCP server and joined the WLC seamlessly.
As Rich suggested, could this all be down to hardware failures?
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part1
UBI: fixable bit-flip detected at PEB 431
UBI: fixable bit-flip detected at PEB 1119
Booting from part1
Read 1024 bytes from volume part1 to 45000000
Read 23462495 bytes from volume part1 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment
Starting image ...
[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), c r=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruc tion cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=30M@1280M console=ttyHSL1,9600n8 activepart=part1 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:00.2200]
[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
[01/01/1970 00:00:08.7174] [sched_delayed] sched: RT throttling activated
[01/01/1970 00:00:18.7943] ACPU PVS: 1
[01/01/1970 00:00:19.8139] buginf tty flushing thread started, ttyport=ef3fb690
[01/01/1970 00:00:24.4325] msm_hsusb_host msm_hsusb_host: unable to find transce iver
[*01/01/1970 00:00:24.6824] buginf() enabled.
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
[*01/01/1970 00:00:24.6924] Made it into bootsh: Jun 4 2018 23:03:02
[*01/01/1970 00:00:24.6924] bootsh build T-5a1977b5600aa94dd31adcabae872ed6700b2 ea1-g5a1977b5-vipendya
init started: BusyBox v1.23.2 (2018-06-04 22:46:06 PDT)
[*01/01/1970 00:00:27.7215] GCM-128 POST passed
[*01/01/1970 00:00:27.7215] GCM-256 POST passed
[*01/01/1970 00:00:27.9714] Active version: 8.3.143.0
[*01/01/1970 00:00:27.9714] Backup version: 0.0.0.0
[*01/01/1970 00:00:28.1813] AP1852I
Jan 1 00:00:28 FIPS[790]: *** shell: FIPS Mode = disabled ***
User Access Verification
Username: [*01/01/1970 00:00:28.3013] nss_driver - Turbo Support 1
[*01/01/1970 00:00:28.3013] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*01/01/1970 00:00:28.4313]
[*01/01/1970 00:00:28.4313] phy_value=0: org="0x1000" phy_reg="0x1800"
[*01/01/1970 00:00:28.8011] Current value of FACTORY_RESET=0
[*01/01/1970 00:00:28.8111] Last reload time: Jun 4 23:03:21 2018
[*06/04/2018 23:03:21.0000] Setting system time Mon Jun 4 23:03:21 UTC 2018
[*06/04/2018 23:03:21.0599]
[*06/04/2018 23:03:21.0599]
[*06/04/2018 23:03:21.0599] === 5G radio domain is 41, COPY 5G BDF files from non_ETSI_BDF folder ===
[*06/04/2018 23:03:21.0599]
[*06/04/2018 23:03:21.0599]
[*06/04/2018 23:03:21.1399] device wired0 entered promiscuous mode
[*06/04/2018 23:03:21.1999] device wired1 entered promiscuous mode
[*06/04/2018 23:03:21.5898] stile module dp init successfully
[*06/04/2018 23:03:21.5898] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR V ERSION:module build date: Oct 4 2017 at 08:58:38
[*06/04/2018 23:03:22.1796] miibus get ef66b800!
[*06/04/2018 23:03:22.2096]
[*06/04/2018 23:03:22.2196] boot 3 build T-5a1977b5600aa94dd31adcabae872ed6700b2 ea1-g5a1977b5-vipendya board corsica mac D4:AD:71:68:13:38
[*06/04/2018 23:03:22.2196] Module: mbedtls .text=0xbf000000 data=0xbf00 7e18 bss=0xbf008070
[*06/04/2018 23:03:22.2196] Module: aptrace .text=0xbf00c000 data=0xbf01 41dc bss=0xbf0145e0
[*06/04/2018 23:03:22.2196] Module: qca_nss_gmac .text=0xbf01b000 data=0 xbf021b7c bss=0xbf02203c
[*06/04/2018 23:03:22.2196] Module: qca_nss_drv .text=0xbf02b000 data=0x bf042a40 bss=0xbf0437f0
[*06/04/2018 23:03:22.2196] Module: qca_nss_capwapmgr .text=0xbf05f000 d ata=0xbf062b78 bss=0xbf062cc8
[*06/04/2018 23:03:22.2196] Module: nssmgrctl .text=0xbf068000 data=0xbf 069728 bss=0xbf069a4c
[*06/04/2018 23:03:22.2196] Module: proclikefs .text=0xbf06f000 data= bss=0xbf06fb40
[*06/04/2018 23:03:22.2196] Module: stile_lm_ft .text= data= bss=
[*06/04/2018 23:03:22.2196] Module: stile_lm_dp .text= data= bss=
[*06/04/2018 23:03:22.2196] Module: bonding .text=0xbf976000 data=0xbf98 763c bss=0xbf987a68
[*06/04/2018 23:03:22.2196] Module: ipv6 .text=0xbf994000 data=0xbf9c484 0 bss=0xbf9c60ec
[*06/04/2018 23:03:22.2196] Module: lowmemorykiller .text=0xbf9df000 dat a=0xbf9df2c0 bss=0xbf9df44c
[*06/04/2018 23:03:22.2196] Module: qca_nss_profile_drv .text=0xbf9e3000 data=0xbf9e4324 bss=0xbf9e4498
[*06/04/2018 23:03:22.2196] Module: ssdk_reg .text=0xbf9e9000 data= bss=0xbf9e9838
[*06/04/2018 23:03:22.6295] Last reload reason : 0: unknown
[*06/04/2018 23:03:24.2790]
[*06/04/2018 23:03:24.2790] __ol_ath_attach() Allocated scn c4040480
[*06/04/2018 23:03:24.2890] Chip id: 0x9, chip version: 0x1000000
[*06/04/2018 23:03:24.2890]
[*06/04/2018 23:03:24.2890] Target Version is 1000000
[*06/04/2018 23:03:24.2890]
[*06/04/2018 23:03:24.2890] Flash Download Address c0000
[*06/04/2018 23:03:24.2890] ol_transfer_bin_file: flash data file defined
[*06/04/2018 23:03:24.2890] Cal location [0]: 00000000
[*06/04/2018 23:03:24.2890]
[*06/04/2018 23:03:24.2890] Wifi0 NAND FLASH Select OFFSET 0x1000
[*06/04/2018 23:03:24.3090] qc98xx_verify_checksum: flash checksum passed: 0x12d 7
[*06/04/2018 23:03:24.3090] ol_transfer_bin_file 4092: Download Flash data len 1 2064
[*06/04/2018 23:03:24.3290]
[*06/04/2018 23:03:24.3290] Board data initialized
[*06/04/2018 23:03:24.3789] ol_ath_download_firmware :First OTP download and Exe cute is good address:0xa000 return param 4660
[*06/04/2018 23:03:24.3789] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*06/04/2018 23:03:24.3789] ol_transfer_bin_file: Board Data File download to ad dress=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_ 2G_v2_008.bin
[*06/04/2018 23:03:24.4489]
[*06/04/2018 23:03:24.4489] [Flash] : Ignore Module param
[*06/04/2018 23:03:24.4489] ol_ath_download_firmware : Second OTP download and E xecute is good, param=0x0
[*06/04/2018 23:03:24.4689] ol_transfer_bin_file: Downloading firmware file: AR9 00B/hw.2/athwlan.bin
[*06/04/2018 23:03:25.5786] HTC Rx: insufficient length, got:4 expected =8
[*06/04/2018 23:03:25.5786] Startup Mode-0 set
[*06/04/2018 23:03:25.5786] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/04/2018 23:03:25.5786] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/04/2018 23:03:25.5786] Firmware_Build_Number:5
[*06/04/2018 23:03:25.5786] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht _cap_info:0x339a79b2 vht_supp_mcs:0x0000ffea
[*06/04/2018 23:03:25.5786]
[*06/04/2018 23:03:25.5786] RES CFG Support wmi_service_bitmap 9778
[*06/04/2018 23:03:25.5786]
[*06/04/2018 23:03:25.5786] Sending Ext resource cfg: HOST PLATFORM as 0 and fw _feature_bitmap as 10 to TGT
[*06/04/2018 23:03:25.5786] Mesh Supported
[*06/04/2018 23:03:25.6485] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/04/2018 23:03:25.6585] ACS not enabled
[*06/04/2018 23:03:25.6585] ol_ath_thermal_mitigation_attach: --
[*06/04/2018 23:03:25.6585]
[*06/04/2018 23:03:25.6585] __ol_ath_attach() Allocated scn ebf80480
[*06/04/2018 23:03:25.6685] Chip id: 0x9, chip version: 0x1000000
[*06/04/2018 23:03:25.6685]
[*06/04/2018 23:03:25.6685] Target Version is 1000000
[*06/04/2018 23:03:25.6685]
[*06/04/2018 23:03:25.6685] Flash Download Address c0000
[*06/04/2018 23:03:25.6685] ol_transfer_bin_file: flash data file defined
[*06/04/2018 23:03:25.6685] Cal location [1]: 00004000
[*06/04/2018 23:03:25.6685]
[*06/04/2018 23:03:25.6685] wifi1 NAND FLASH Select OFFSET 0x5000
[*06/04/2018 23:03:25.6985] qc98xx_verify_checksum: flash checksum passed: 0x43a 1
[*06/04/2018 23:03:25.6985] ol_transfer_bin_file 4092: Download Flash data len 1 2064
[*06/04/2018 23:03:25.7185]
[*06/04/2018 23:03:25.7185] Board data initialized
[*06/04/2018 23:03:25.7585] ol_ath_download_firmware :First OTP download and Exe cute is good address:0x9c00 return param 4660
[*06/04/2018 23:03:25.7585] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*06/04/2018 23:03:25.7585] ol_transfer_bin_file: Board Data File download to ad dress=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_ 5G_v2_007.bin
[*06/04/2018 23:03:25.8385]
[*06/04/2018 23:03:25.8385] [Flash] : Ignore Module param
[*06/04/2018 23:03:25.8385] ol_ath_download_firmware : Second OTP download and E xecute is good, param=0x0
[*06/04/2018 23:03:25.8585] ol_transfer_bin_file: Downloading firmware file: AR9 00B/hw.2/athwlan.bin
[*06/04/2018 23:03:26.5783] FWLOG: [33989] WAL_DBGID_AST_DEL_WDS_ENTRY ( 0xdeadc 0de, 0xea, 0x32 )
[*06/04/2018 23:03:26.5783] FWLOG: [34061] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1 e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:26.5783] FWLOG: [34061] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:26.5783] FWLOG: [34061] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:26.5783] FWLOG: [34061] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:26.9581] HTC Rx: insufficient length, got:4 expected =8
[*06/04/2018 23:03:26.9581] Startup Mode-0 set
[*06/04/2018 23:03:26.9581] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/04/2018 23:03:26.9581] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/04/2018 23:03:26.9581] Firmware_Build_Number:5
[*06/04/2018 23:03:26.9581] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht _cap_info:0x339b79b2 vht_supp_mcs:0x0000ffea
[*06/04/2018 23:03:26.9581]
[*06/04/2018 23:03:26.9581] RES CFG Support wmi_service_bitmap 9778
[*06/04/2018 23:03:26.9581]
[*06/04/2018 23:03:26.9581] Sending Ext resource cfg: HOST PLATFORM as 0 and fw _feature_bitmap as 10 to TGT
[*06/04/2018 23:03:26.9581] Mesh Supported
[*06/04/2018 23:03:27.0281] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/04/2018 23:03:27.0381] acfg_attach: Offload using existing sock ec4cc000
[*06/04/2018 23:03:27.0381] ACS not enabled
[*06/04/2018 23:03:27.0381] ol_ath_thermal_mitigation_attach: --
[*06/04/2018 23:03:27.0481] pktlog_init: Initializing Pktlog for AR900B, pktlog _hdr_size = 16
[*06/04/2018 23:03:27.0481] pktlog_init: Initializing Pktlog for AR900B, pktlog _hdr_size = 16
[*06/04/2018 23:03:27.9578] FWLOG: [35362] WAL_DBGID_AST_DEL_WDS_ENTRY ( 0xdeadc 0de, 0xea, 0x32 )
[*06/04/2018 23:03:27.9578] FWLOG: [35432] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1 e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:27.9578] FWLOG: [35432] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:27.9578] FWLOG: [35432] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:27.9578] FWLOG: [35432] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x 1e, 0x94c, 0x94c, 0x0 )
[*06/04/2018 23:03:27.9578] FWLOG: [35440] UNKNOWN 22:55 ( 0x3a, 0x10, 0x0, 0x10 , 0x0 )
[*06/04/2018 23:03:28.8575] pid 1627's current affinity mask: 3
[*06/04/2018 23:03:28.8575] pid 1627's new affinity mask: 1
[*06/04/2018 23:03:30.4271] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgv alid[0] 00000000 cfgvalid[1] 00000000
[*06/04/2018 23:03:30.4370] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgv alid[0] 00000000 cfgvalid[1] 00000000
[*06/04/2018 23:03:31.5467]
[*06/04/2018 23:03:31.5467] Click sched monitor: schedulers = 1
[*06/04/2018 23:03:32.4665] wired0: 1000 Mbps Full Duplex
[*06/04/2018 23:03:32.4665]
[*06/04/2018 23:03:33.9460]
[*06/04/2018 23:03:33.9460] phy_value=0: org="0x1800" phy_reg="0x1000"
[*06/04/2018 23:03:44.9726] Loading sha2...
[*06/04/2018 23:03:44.9726] Dumpping sha1...
[*06/04/2018 23:03:46.6720] Loading MIC cert and key
[*06/04/2018 23:03:46.6720] Dumpping sha2...
[*06/04/2018 23:03:48.4915] Loading MIC cert and key
[*06/04/2018 23:03:48.8613] Generating key, this may take a while...
[*06/04/2018 23:03:49.7511] Public key portion is:
[*06/04/2018 23:03:49.7511] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCHezY7vKAHgR/TWwmbzvO0hmVciVW6gT+BA9Sr+6cdyteE 3B1LhluXiZrVbIBy1XeZChprPFAtmVRvwz6o5YM0lP96qp8kaiOYSbPhr8lm/ttSSN0aAzWK/cc3U0m3h6DWGFs1GhTX8yyves5QkPrV7lH3HQid 6pl2helGNYho6dclKiIROqADdq2pWPO5nHvcc+5uLI+3MjDkRZf1BNAkf/wETaIEFr3zTWDcr8D+yMGD8N/ezYt4Bkd68nu5JLeNMNxraBXU9wjS QjpCLHvV23oUcEM17mEppSWgajBA/a86SDMS9IvC9OcYG9J+TUbQVc6azibcxxDYC9Rfnm67 root@mD4AD71681338
[*06/04/2018 23:03:49.7511] Fingerprint: md5 33:3a:20:ea:a3:6f:d0:85:6f:25:a6:2d:68:7c:7f:31
[*06/04/2018 23:03:49.7910] pid 2982's current affinity mask: 3
[*06/04/2018 23:03:49.7910] pid 2982's new affinity mask: 1
[*06/04/2018 23:03:50.2609] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_f w\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/ g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/41/g' -e 's /__PRODUCT_ID__/AIR-AP1852I-B-K9/g' -e 's/__AP_TYPE__/48/g' -e 's/__WIRELESS_MAC__/D4:AD:71:68:93:00/g' -e 's/__ WIRED_MAC__/D4:AD:71:68:13:38/g' -e 's/__WIRED1_MAC__/D4:AD:71:68:13:38/g' | DMALLOC_OPTIONS=debug=0x03,inter=10 00,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*06/04/2018 23:03:50.7208] Password for 'Cisco' changed
[*06/04/2018 23:03:51.7704] DOT11_DRV[1]: Init Radio1
[*06/04/2018 23:03:51.7904] DOT11_DRV[1]: Stop Radio1
[*06/04/2018 23:03:51.7904] DOT11_DRV[1]: set_channel Channel set to 36
[*06/04/2018 23:03:51.8004] DOT11_DRV[0]: Init Radio0
[*06/04/2018 23:03:51.8304] DOT11_DRV[0]: Stop Radio0
[*06/04/2018 23:03:51.8304] DOT11_DRV[0]: set_channel Channel set to 6
[*06/04/2018 23:03:52.7901] DOT11_DRV[0]: set_channel Channel set to 1
[*06/04/2018 23:03:52.8001] DOT11_DRV[0]: Channel set to 1, width 20
[*06/04/2018 23:03:52.8001] DOT11_DRV[0]: Channel set to 1, width 20
[*06/04/2018 23:03:52.8201] DOT11_DRV[1]: set_channel Channel set to 36
[*06/04/2018 23:03:52.8201] DOT11_DRV[1]: Channel set to 36, width 20
[*06/04/2018 23:03:52.8201] DOT11_DRV[1]: Channel set to 36, width 20
[*06/04/2018 23:03:56.8288] Waiting for uplink IPv4/IPv6 configuration
[*06/04/2018 23:04:01.8273] Waiting for uplink IPv4/IPv6 configuration
[*06/04/2018 23:04:05.0563] ethernet_port wired0, ip 10.61.18.10, netmask 255.255.254.0, gw 10.61.18.1, mtu 1500 , bcast 10.61.19.255, dns1 10.61.96.32, dns2 10.61.96.33, domain my-eclipse.local, vid 0, static_ip_failover fal se, dhcp_vlan_failover false
[*06/04/2018 23:04:05.8660] AP IPv4 Address updated from 0.0.0.0 to 10.61.18.10
[*06/04/2018 23:04:05.8860] dtls_init: Use MIC device cert
[*06/04/2018 23:04:05.8860] dtls_init: Use MIC device cert private key
[*06/04/2018 23:04:05.8860]
[*06/04/2018 23:04:05.8860] CAPWAP State: Init
[*06/04/2018 23:04:05.8860]
[*06/04/2018 23:04:05.8860] Config not found, PNP is required, Starting PNP
[*06/04/2018 23:04:05.8860]
[*06/04/2018 23:04:28.6989] PNP Discovery Timer Expired, Starting CAPWAP Discovery
[*06/04/2018 23:04:28.6989]
[*06/04/2018 23:04:28.6989] CAPWAP State: Discovery
[*06/04/2018 23:04:31.7879] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*06/04/2018 23:04:31.7879]
[*06/04/2018 23:04:31.7879] CAPWAP State: Discovery
[*06/04/2018 23:04:31.7879] Discovery Response from 10.61.18.37
[*08/19/2023 14:17:48.0000] TLV-DEC-ERR: cannot process TLV for TLV_EXPIRE_MIC_TYPE_PAYLOAD(661/0)
[*08/19/2023 14:17:48.0000] TLV-DEC-ERR: No CB for TLV_EXPIRE_MIC_TYPE_PAYLOAD(661)
[*08/19/2023 14:17:48.0000]
[*08/19/2023 14:17:48.0000] CAPWAP State: DTLS Setup
[*08/19/2023 14:17:48.0199] dtls_load_ca_certs: LSC Root Certificate not present
[*08/19/2023 14:17:48.0199]
[*08/19/2023 14:17:48.1799]
[*08/19/2023 14:17:48.1799] CAPWAP State: Join
[*08/19/2023 14:17:48.1799] Sending Join request to 10.61.18.37 through port 5248
[*08/19/2023 14:17:48.1799] Join Response from 10.61.18.37
[*08/19/2023 14:17:48.2499] mount: mounting debugfs on /sys/kernel/debug failed: Device or resource busy
[*08/19/2023 14:17:48.2899]
[*08/19/2023 14:17:48.2899] CAPWAP State: Image Data
[*08/19/2023 14:17:48.3399] do PRECHECK, part1 is active part
[*08/19/2023 14:17:48.3699] Image Data Request sent to 10.61.18.37
[*08/19/2023 14:17:48.5798] ..................................................
[*08/19/2023 14:17:58.2368] ..................................................
[*08/19/2023 14:18:08.2337] ..................................................
[*08/19/2023 14:18:18.3805]
[*08/19/2023 14:18:18.3805] Successfully downloaded image.
[*08/19/2023 14:18:18.4205] do PREDOWNLOAD, part1 is active part
[*08/19/2023 14:18:24.0687] Image signing verify success.
[*08/19/2023 14:18:24.6086] Verify returns 0
[*08/19/2023 14:18:24.6086] Unlocking /dev/mtd4 ...
[*08/19/2023 14:18:24.6485] Erasing /dev/mtd4 ...
[*08/19/2023 14:18:42.4330] 23+0 records in
[*08/19/2023 14:18:42.4330] 23+0 records out
[*08/19/2023 14:18:44.8922] upgrade.sh: part to upgrade is part2
[*08/19/2023 14:19:03.8363] upgrade.sh: AP backup version: 8.10.151.0
[*08/19/2023 14:19:04.1562] do ACTIVATE, part1 is active part
[*08/19/2023 14:19:04.3062] upgrade.sh: activate part2, set BOOT to part2
[*08/19/2023 14:19:04.6061] upgrade.sh: AP primary version: 8.10.151.0
[*08/19/2023 14:19:04.6161] upgrade.sh: AP backup version: 8.3.143.0
[*08/19/2023 14:19:07.6251] AP Rebooting: Reset Request from Controller(Image Upgrade)
Writing reload timestamp (Sat Aug 19 14:19:07 UTC 2023) to disk
[08/19/2023 14:19:08.7248] UBIFS: un-mount UBI device 0, volume 3
The system is going down NOW!
Sent SIGTERM to all processes
Sent SIGKILL to all processes
Requesting system reboot44]
[08/19/2023 14:19:10.8241] Restarting system.
[08/19/2023 14:19:10.8641] Going down for restart now
U-Boot 2012.07 (btldr release 31) (Mar 15 2017 - 15:00:35)
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
DRAM: 1 GiB
NAND (ONFI): Detected MICRON MT29F2G08ABBEAH4 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[1:1], write_counter=4
PCI0 Link Intialized
PCI1 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3af POE or Others detected...
Found new boot image.
Validating new image integrity ... Passed.
Erasing current boot.
Erasing at 0x16f000 -- 100% complete.
Copy boot image ...
................................................................................................................................................................................................................................................................................................................................
First validation passed.
Active new image.
................................
Second validation passed.
Disable backup copy ...
Erasing at 0x33f000 -- 100% complete.
Boot upgrade completed.
resetting ...
U-Boot 2012.07 (btldr release 38) (Oct 29 2019 - 06:39:45)
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
DRAM: 1 GiB
NAND (ONFI): Detected MICRON MT29F2G08ABBEAH4 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[1:1], write_counter=4
PCI0 Link Intialized
PCI1 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3af POE or Others detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part2
UBI: fixable bit-flip detected at PEB 431
UBI: fixable bit-flip detected at PEB 439
UBI: fixable bit-flip detected at PEB 636
UBI: fixable bit-flip detected at PEB 1243
Booting from part2
Read 1024 bytes from volume part2 to 45000000
Read 39523628 bytes from volume part2 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment
Starting image ...
[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M usbcore.authorized_default=0 console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:00.2200]
[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
[01/01/1970 00:00:24.9324] ACPU PVS: 1
[01/01/1970 00:00:26.7318] buginf tty flushing thread started, ttyport=eed2ae90
[*01/01/1970 00:00:32.8099] buginf() enabled.
[*01/01/1970 00:00:32.8199] Made it into bootsh: Mar 3 2021 15:40:12 T-0b7bc0faa97ae8a26ea605c7622aac357397184c-g0b7bc0fa-aut
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.
[*01/01/1970 00:00:34.2594] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:34.2694] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:34.3294] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:34.3394] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[ OK ] Created slice -.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Reached target Timers.
[ OK ] Reached target Sockets.
[ OK ] Created slice system.slice.
Starting Cisco UBIFS reformat/mount...
[ OK ] Created slice system-serial\x2dgetty.slice.
[ OK ] Reached target Slices.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco platform file generation...
Starting Cisco fips check...
Starting Cisco system time setup...
[*01/01/1970 00:00:39.0779] GCM-128 POST passed
[*01/01/1970 00:00:39.0779] GCM-256 POST passed
[*01/01/1970 00:00:39.1079] Last reload time: Aug 19 14:19:07 2023
[*08/19/2023 14:19:07.0000] Setting system time Sat Aug 19 14:19:07 UTC 2023
Starting Cisco seed generation...
[ OK ] Started Cisco platform file generation.
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco system time setup.
[ OK ] Started Cisco seed generation.
[ OK ] Reached target Local File Systems.
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
Starting Cisco S10 boot service...
Starting Cisco pkg install service...
[08/19/2023 14:19:07.0699] sysctl link missing during unregister: /net/ipv4/neigh//eth0
[08/19/2023 14:19:07.2799] sysctl link missing during unregister: /net/ipv4/neigh//eth1
[ OK ] Started Cisco S10 boot service.
Starting Cisco nss service...
[*08/19/2023 14:19:08.1696] Volume ID 4, size 372 LEBs (47235072 bytes, 45.0 MiB), LEB size 126976 bytes (124.0 KiB), dynamic, name "storage2", alignment 1
[*08/19/2023 14:19:09.4492] === 5G radio domain is 41, COPY 5G BDF files from non_ETSI_BDF folder ===
[*08/19/2023 14:19:09.4792] 0
[*08/19/2023 14:19:09.6992] Active version: 8.10.151.0
[*08/19/2023 14:19:09.6992] Backup version: 8.3.143.0
[*08/19/2023 14:19:09.9191]
[*08/19/2023 14:19:09.9191] led pattern module start
[*08/19/2023 14:19:09.9691] AP1852I
[*08/19/2023 14:19:10.0790] nss_driver - Turbo Support 1
[*08/19/2023 14:19:10.0790] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*08/19/2023 14:19:10.1190] NSS firmware booted
[*08/19/2023 14:19:10.1490] NSS firmware booted
[*08/19/2023 14:19:10.2490]
[*08/19/2023 14:19:10.2490] phy_value=0: org="0x1000" phy_reg="0x1800"
[*08/19/2023 14:19:10.6689] Current value of FACTORY_RESET=0
[*08/19/2023 14:19:10.7088] Last reload time: Aug 19 14:19:07 2023
[*08/19/2023 14:19:07.0000] Setting system time Sat Aug 19 14:19:07 UTC 2023
[*08/19/2023 14:19:07.1799] device wired0 entered promiscuous mode
[*08/19/2023 14:19:07.3599] device wired1 entered promiscuous mode
[*08/19/2023 14:19:08.2296] Last reload reason : 2: Image Upgrade
Starting Cisco watchdog...
Starting Cisco nolan service...
[ OK ] Started Cisco pkg install service.
[ OK ] Started Cisco nss service.
[ OK ] Started Cisco watchdog.
[ OK ] Started Cisco nolan service.
Starting Cisco Kclick...
Starting Cisco nolan USB service...
Starting Cisco S15platform...
[*08/19/2023 14:19:10.5489] stile module dp init successfully
[*08/19/2023 14:19:10.5489] NBAR Label:BLD_POLARIS_DEV_LATEST_20200414_053707 Module timestamp: Mar 3 2021 at 15:34:28 User: ttaichol
[ OK ] Started Cisco Kclick.
[ OK ] Started Cisco nolan USB service.
[ OK ] Started Cisco S15platform.
Starting Cisco certificate create service...
Starting Cisco Kclick...
Starting Cisco ME service...
[*08/19/2023 14:19:11.3386] Loading sha2...
[*08/19/2023 14:19:11.3486] Dumpping sha1...
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco Kclick.
Starting Cisco S16platfomm...
Starting rsyslog client...
[*08/19/2023 14:19:11.6485] miibus get eedbcc00!
Starting Cisco syslog service...
[ OK ] Started Cisco S16platfomm.
[ OK ] Started rsyslog client.
[ OK ] Started Cisco syslog service.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ OK ] Started Cisco certificate create service.
Starting Cisco certtime service...
[ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[*08/19/2023 14:19:12.6082] Loading MIC cert and key
[*08/19/2023 14:19:12.6182] Dumpping sha2...
[*08/19/2023 14:19:12.6482] pid 2926's current affinity mask: 3
[*08/19/2023 14:19:12.6482] pid 2926's new affinity mask: 1
[*08/19/2023 14:19:13.9278] Loading MIC cert and key
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
Starting gRPC server daemon...
[ OK ] Started NSS Firmware Monitor daemon.
Starting NSS Firmware Monitor daemon...
Starting Cisco led service...
Starting Fast CGI daemon...
Starting Cisco brain service...
Starting Cisco printkd...
Starting Hostapd process...
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting Cisco kexec...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting WCPD process...
Starting capwapd...
Starting Cisco rtd service...
Starting OpenSSH server daemon...
Starting Cisco klogd...
Starting Clean Air daemon...
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting AP Trace daemon...
[ OK ] Started Cisco led service.
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco klogd.
[ OK ] Started Fast CGI daemon.
[ OK ] Started Hostapd process.
[ OK ] Started Cisco rtd service.
[ OK ] Started AP Trace daemon.
[ OK ] Started Cisco brain service.
[*08/19/2023 14:19:17.7666] pid 3059's current affinity mask: 3
[*08/19/2023 14:19:17.7666] pid 3059's new affinity mask: 1
[*08/19/2023 14:19:18.5964] pid 3121's current affinity mask: 3
[*08/19/2023 14:19:18.5964] pid 3121's new affinity mask: 1
[*08/19/2023 14:19:19.0962] __mm_init_module
[*08/19/2023 14:19:19.1662]
[*08/19/2023 14:19:19.1662] __ol_ath_attach() Allocated scn ed880480
[*08/19/2023 14:19:19.1762] ol_ath_attach interface_id 0
[*08/19/2023 14:19:19.1762] Chip id: 0x9, chip version: 0x1000000
[*08/19/2023 14:19:19.1862]
[*08/19/2023 14:19:19.1862] Target Version is 1000000
[*08/19/2023 14:19:19.1862]
[*08/19/2023 14:19:19.1862] Flash Download Address c0000
[*08/19/2023 14:19:19.1862] ol_transfer_bin_file: flash data file defined
[*08/19/2023 14:19:19.1862] Cal location [0]: 00000000
[*08/19/2023 14:19:19.1862]
[*08/19/2023 14:19:19.1862] Wifi0 NAND FLASH Select OFFSET 0x1000
[*08/19/2023 14:19:19.2062] qc98xx_verify_checksum: flash checksum passed: 0x12d7
[*08/19/2023 14:19:19.2062] ol_transfer_bin_file 3861: Download Flash data len 12064
[*08/19/2023 14:19:19.2362]
[*08/19/2023 14:19:19.2362] Board data initialized
[*08/19/2023 14:19:19.2762] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660
[*08/19/2023 14:19:19.2762] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*08/19/2023 14:19:19.2762] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin
[*08/19/2023 14:19:19.3461]
[*08/19/2023 14:19:19.3461] [Flash] : Ignore Module param
[*08/19/2023 14:19:19.3461] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*08/19/2023 14:19:19.3761] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*08/19/2023 14:19:20.4858] HTC Rx: insufficient length, got:4 expected =8
[*08/19/2023 14:19:20.4858] Startup Mode-0 set
[*08/19/2023 14:19:20.4858] HTC Service:0x0300 ep:1 TX flow control disabled
[*08/19/2023 14:19:20.4858] HTC Service:0x0100 ep:2 TX flow control disabled
[*08/19/2023 14:19:20.4858] Firmware_Build_Number:70
[*08/19/2023 14:19:20.4858] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffaa
[*08/19/2023 14:19:20.4858]
[*08/19/2023 14:19:20.4858] RES CFG Support wmi_service_bitmap 9778
[*08/19/2023 14:19:20.4858]
[*08/19/2023 14:19:20.4858] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*08/19/2023 14:19:20.4858] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*08/19/2023 14:19:20.5158]
[*08/19/2023 14:19:20.5158] Click sched monitor: schedulers = 1
[*08/19/2023 14:19:20.5658] wmi_ready_event_rx: WMI UNIFIED READY event
[*08/19/2023 14:19:20.5658] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0
[*08/19/2023 14:19:20.5658] spectral_init_netlink 81 NULL SKB
[*08/19/2023 14:19:20.5658] ACS not enabled
[*08/19/2023 14:19:20.5858] ol_ath_thermal_mitigation_attach: --
[*08/19/2023 14:19:20.5858]
[*08/19/2023 14:19:20.5858] __ol_ath_attach() Allocated scn eda40480
[*08/19/2023 14:19:20.5957] ol_ath_attach interface_id 1
[*08/19/2023 14:19:20.5957] Chip id: 0x9, chip version: 0x1000000
[*08/19/2023 14:19:20.5957]
[*08/19/2023 14:19:20.5957] Target Version is 1000000
[*08/19/2023 14:19:20.5957]
[*08/19/2023 14:19:20.5957] Flash Download Address c0000
[*08/19/2023 14:19:20.5957] ol_transfer_bin_file: flash data file defined
[*08/19/2023 14:19:20.5957] Cal location [1]: 00004000
[*08/19/2023 14:19:20.5957]
[*08/19/2023 14:19:20.5957] wifi1 NAND FLASH Select OFFSET 0x5000
[*08/19/2023 14:19:20.6157] qc98xx_verify_checksum: flash checksum passed: 0x43a1
[*08/19/2023 14:19:20.6157] ol_transfer_bin_file 3861: Download Flash data len 12064
[*08/19/2023 14:19:20.6357]
[*08/19/2023 14:19:20.6357] Board data initialized
[*08/19/2023 14:19:20.6957] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return param 4660
[*08/19/2023 14:19:20.6957] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*08/19/2023 14:19:20.6957] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_5G_v2_007.bin
[*08/19/2023 14:19:20.7657]
[*08/19/2023 14:19:20.7657] [Flash] : Ignore Module param
[*08/19/2023 14:19:20.7657] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*08/19/2023 14:19:20.7857] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*08/19/2023 14:19:21.4855] FWLOG: [57516] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:21.4855] FWLOG: [57516] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:21.4855] FWLOG: [57516] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:21.4855] FWLOG: [57516] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:21.8953] HTC Rx: insufficient length, got:4 expected =8
[*08/19/2023 14:19:21.8953] Startup Mode-0 set
[*08/19/2023 14:19:21.8953] HTC Service:0x0300 ep:1 TX flow control disabled
[*08/19/2023 14:19:21.8953] HTC Service:0x0100 ep:2 TX flow control disabled
[*08/19/2023 14:19:21.8953] Firmware_Build_Number:70
[*08/19/2023 14:19:21.8953] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x0000ffaa
[*08/19/2023 14:19:21.8953]
[*08/19/2023 14:19:21.8953] RES CFG Support wmi_service_bitmap 9778
[*08/19/2023 14:19:21.8953]
[*08/19/2023 14:19:21.8953] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*08/19/2023 14:19:21.8953] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*08/19/2023 14:19:21.9653] wmi_ready_event_rx: WMI UNIFIED READY event
[*08/19/2023 14:19:21.9653] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 1
[*08/19/2023 14:19:21.9753] acfg_attach: Offload using existing sock c4178800
[*08/19/2023 14:19:21.9753] spectral_init_netlink 81 NULL SKB
[*08/19/2023 14:19:21.9753] ACS not enabled
[*08/19/2023 14:19:21.9953] ol_ath_thermal_mitigation_attach: --
[*08/19/2023 14:19:22.0953] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*08/19/2023 14:19:22.0953] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*08/19/2023 14:19:22.8950] FWLOG: [58916] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:22.8950] FWLOG: [58916] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:22.8950] FWLOG: [58916] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:22.8950] FWLOG: [58916] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*08/19/2023 14:19:22.8950] FWLOG: [58924] WAL_DBGID_PDEV_INFO_PRINT ( 0x3a, 0x10, 0x0, 0x10, 0x0 )
User Access Verification
Username: [*08/19/2023 14:19:25.5242] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*08/19/2023 14:19:25.5342] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*08/19/2023 14:19:26.0741] ip6_port srcr2, ip6local fe80::d6ad:71ff:fe68:1338, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac)
[*08/19/2023 14:19:27.5136] pid 4083's current affinity mask: 3
[*08/19/2023 14:19:27.5136] pid 4083's new affinity mask: 1
[*08/19/2023 14:19:27.7736] pid 4101's current affinity mask: 3
[*08/19/2023 14:19:27.7736] pid 4101's new affinity mask: 1
[*08/19/2023 14:19:27.7935] device aptrace0 entered promiscuous mode
[*08/19/2023 14:19:27.8135] device to_container entered promiscuous mode
[*08/19/2023 14:19:29.1031] pid 4130's current affinity mask: 3
[*08/19/2023 14:19:29.1031] pid 4130's new affinity mask: 1
[*08/19/2023 14:19:29.1331] chpasswd: password for user changed
[*08/19/2023 14:19:31.3724] DOT11_TXP[1]:Domain configured: 41 class:B
[*08/19/2023 14:19:32.1922] DOT11_TXP[0]:Domain configured: 0 class:A
[*08/19/2023 14:19:32.6020] DOT11_DRV[0]: Init Radio0
[*08/19/2023 14:19:32.6420] DOT11_DRV[0]: set_channel Channel set to 6
[*08/19/2023 14:19:32.6620] DOT11_DRV[1]: Init Radio1
[*08/19/2023 14:19:32.7020] DOT11_DRV[1]: set_channel Channel set to 36
[*08/19/2023 14:19:33.3218] DOT11_DRV[0]: set_channel Channel set to 1
[*08/19/2023 14:19:33.3418] DOT11_DRV[0]: Channel set to 1, width 20
[*08/19/2023 14:19:33.3418] DOT11_DRV[0]: Channel set to 1, width 20
[*08/19/2023 14:19:33.3618] DOT11_DRV[1]: set_channel Channel set to 36
[*08/19/2023 14:19:33.3618] DOT11_DRV[1]: Channel set to 36, width 20
[*08/19/2023 14:19:33.3618] DOT11_DRV[1]: Channel set to 36, width 20
[*08/19/2023 14:19:33.9716] ethernet_port wired0, ip 10.61.18.10, netmask 255.255.254.0, gw 10.61.18.1, mtu 1500, bcast 10.61.19.255, dns1 10.61.96.32, dns2 10.61.96.33, domain my-eclipse.local, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*08/19/2023 14:19:44.2584] AP IPv4 Address updated from 0.0.0.0 to 10.61.18.10
[*08/19/2023 14:19:46.5577] dtls_init: Use MIC certificate
[*08/19/2023 14:19:46.5577]
[*08/19/2023 14:19:46.5577] CAPWAP State: Init
[*08/19/2023 14:19:49.2968] Start: RPC thread 1106521232 created.
[*08/19/2023 14:20:12.6295] Set PnP NTP Server pnpntpserver.my-eclipse.local.
[*08/19/2023 14:20:18.7476]
[*08/19/2023 14:20:18.7476] phy_value=0: org="0x1800" phy_reg="0x1000"
[*08/19/2023 14:20:18.7476] device wired1 left promiscuous mode
[*08/19/2023 14:20:42.7301] PNP:Server not reachable, Start CAPWAP Discovery
[*08/19/2023 14:20:42.7401]
[*08/19/2023 14:20:42.7401] CAPWAP State: Discovery
[*08/19/2023 14:20:42.7701] IP DNS query for CISCO-CAPWAP-CONTROLLER.my-eclipse.local
[*08/19/2023 14:20:42.8801] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*08/19/2023 14:20:42.8801]
[*08/19/2023 14:20:42.8801] CAPWAP State: Discovery
[*08/19/2023 14:20:42.8801] Discovery Response from 10.61.18.37
[*08/19/2023 14:20:46.5489] systemd[1]: sshd.service start-pre operation timed out. Terminating.
[*08/19/2023 14:20:46.5489] systemd[1]: Failed to start OpenSSH server daemon.
[*08/19/2023 14:20:46.5489] systemd[1]: sshd.service failed.
[*08/19/2023 14:23:17.0000]
[*08/19/2023 14:23:17.0000] CAPWAP State: DTLS Setup
[*08/19/2023 14:23:17.2399]
[*08/19/2023 14:23:17.2399] CAPWAP State: Join
[*08/19/2023 14:23:17.2399] Sending Join request to 10.61.18.37 through port 5264
[*08/19/2023 14:23:17.2399] Join Response from 10.61.18.37
[*08/19/2023 14:23:17.2399] AC accepted join request with result code: 0
[*08/19/2023 14:23:17.2699] Received wlcType 0, timer 30
[*08/19/2023 14:23:17.3699] nss_capwapmgr_enable_tunnel[1664]:ef309800: tunnel 0 is already enabled
[*08/19/2023 14:23:17.4499]
[*08/19/2023 14:23:17.4499] CAPWAP State: Image Data
[*08/19/2023 14:23:17.4499] AP image version 8.10.151.0 backup 8.3.143.0, Controller 8.10.151.0
[*08/19/2023 14:23:17.4499] Version is the same, do not need update.
[*08/19/2023 14:23:17.4798] upgrade.sh: Script called with args:[NO_UPGRADE]
[*08/19/2023 14:23:17.5198] do NO_UPGRADE, part2 is active part
[*08/19/2023 14:23:17.5198]
[*08/19/2023 14:23:17.5198] CAPWAP State: Configure
[*08/19/2023 14:23:17.6998] Radio [0] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 14:23:17.6998] Radio [1] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 14:23:17.6998] Radio [2] Admininstrative state DISABLED change to ENABLED
[*08/19/2023 14:23:17.7498] DOT11_CFG[0]: Starting radio 0
[*08/19/2023 14:23:17.7498] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 14:23:17.7498] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 14:23:17.7897] DOT11_DRV[0]: Stop Radio0 - Begin
[*08/19/2023 14:23:18.1396] DOT11_DRV[0]: Stop Radio0 - End
[*08/19/2023 14:23:18.1396] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 14:23:18.1396] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 14:23:18.1496] DOT11_CFG[1]: Starting radio 1
[*08/19/2023 14:23:18.1496] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 14:23:18.1496] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 14:23:18.1596] DOT11_DRV[1]: Stop Radio1 - Begin
[*08/19/2023 14:23:18.5395] DOT11_DRV[1]: Stop Radio1 - End
[*08/19/2023 14:23:18.5395] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 14:23:18.5395] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 14:23:18.5395] DOT11_DRV[1]: Stop Radio1 - Begin
[*08/19/2023 14:23:18.5795] DOT11_DRV[1]: Stop Radio1 - End
[*08/19/2023 14:23:18.5795] DOT11_DRV[1]: Start Radio1 - Begin
[*08/19/2023 14:23:18.5795] DOT11_DRV[1]: Start Radio1 - End
[*08/19/2023 14:23:19.6692] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 14:23:19.6892] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
[*08/19/2023 14:23:20.1990] Null cert id for TLV_AP_CACERTS_CONFIG_PAYLOAD
[*08/19/2023 14:23:20.6788]
[*08/19/2023 14:23:20.6788] CAPWAP State: Run
[*08/19/2023 14:23:20.7388] AP has joined controller 0511-WLC
[*08/19/2023 14:23:21.0587] DOT11_DRV[0]: Stop Radio0 - Begin
[*08/19/2023 14:23:21.0687] DOT11_DRV[0]: Stop Radio0 - End
[*08/19/2023 14:23:21.0687] DOT11_DRV[0]: Start Radio0 - Begin
[*08/19/2023 14:23:21.0687] DOT11_DRV[0]: Start Radio0 - End
[*08/19/2023 14:23:24.6176]
[*08/19/2023 14:23:24.6176] phy_value=0: org="0x1000" phy_reg="0x1000"
08-20-2023 06:22 AM
The information you've provided is contradictory!
> I assigned a static IP as well as manually configured the primary controller. Below is a snapshot from what happened after that
The logs show that this AP was NOT able to discover the WLC even with static IP and and controller config.
> I connected a WAP from my spares inventory and observed the following
[*05/12/2023 07:42:04.0785] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
This AP already had static controller configuration (primary and secondary) so would have found the controller regardless and it worked with DHCP.
> Suffice to say that this WAP connected without a hitch, receieved an IP from the DHCP server and joined the WLC seamlessly.
[*06/04/2018 23:04:05.8660] AP IPv4 Address updated from 0.0.0.0 to 10.61.18.10
[*06/04/2018 23:04:31.7879] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*06/04/2018 23:04:31.7879] Discovery Response from 10.61.18.37
So here the AP had no pre-configured controller but got a discovery response from the local subnet broadcast and the WLC appears to be on the same subnet so actually no other discovery mechanism is needed for that WLC and the local APs.
- Are all these APs at the same location and on the same vlan/subnet?
- Are any of them on a different vlan/subnet/site from the WLC?
- If so - what discovery mechanism are you using for those APs to discover the WLC? (clue: DHCP option 43 recommended)
NOTE:
When providing logs please put them in a .txt file and attach the file to your post - don't paste hundreds of lines of logs into the thread - it makes it very different for us to work with! A few lines is fine - hundreds is not!
08-20-2023 10:43 PM
@Rich R wrote:The information you've provided is contradictory!
No it is not! Go back and read the fiull thread. Also, you are the one who asked for the full console logs!
There are now three AP's in this scenario. The first is one that was displaying fault symptoms after the switch reboot (flashing red LED would not connect to the controller). I factory reset this unit, and it would not connect. I manually assigned a static IP and the controller address, it still would not connect.
I took an AP from spares inventory. It connected without issue.
@Rich R wrote:> I connected a WAP from my spares inventory and observed the following
[*05/12/2023 07:42:04.0785] Discovery Request sent to 10.61.XX.XX, discovery type STATIC_CONFIG(1)
This AP already had static controller configuration (primary and secondary) so would have found the controller regardless and it worked with DHCP.
Reagrdless of whether it had a static controller pre-configured, that was how I found it on the shelf. It worked, as in successfully connected to the controller, thats the point I'm illustrating. It may have been used by a predecessor and returned to spares. Hence the static config
I took another from spares inventory (the one with the full console log posted), it connected without issue. This unit appeared to have no static assignments
@Rich R wrote:> Suffice to say that this WAP connected without a hitch, receieved an IP from the DHCP server and joined the WLC seamlessly.
[*06/04/2018 23:04:05.8660] AP IPv4 Address updated from 0.0.0.0 to 10.61.18.10
[*06/04/2018 23:04:31.7879] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*06/04/2018 23:04:31.7879] Discovery Response from 10.61.18.37
So how is this contradictory? These are simply the facts and chain of events as they happened.
To answer your questions;
- Are all these APs at the same location and on the same vlan/subnet? Yes
- Are any of them on a different vlan/subnet/site from the WLC? No
- If so - what discovery mechanism are you using for those APs to discover the WLC? (clue: DHCP option 43 recommended) DHCP Option 82
08-21-2023 03:52 AM
> Also, you are the one who asked for the full console logs!
yes, and that's why I also said "attach the FULL AP console log, from power on, here as a .txt file" - never mind though - worth remembering for future - just makes life easier for all of us.
So if the APs are on the same subnet as the WLC then no other discovery mechanism is necessary - they will use subnet broadcast by default. If they're failing in that scenario then the AP is probably faulty - assuming switch port is correctly configured (did you get a chance to get switch port config?) and they have correct power.
FYI option 82 is not a WLC discovery mechanism, it's for providing extra client info to the DHCP server. @Rasika Nayanajith explains it here: https://mrncciew.com/2013/05/18/understanding-dhcp-option-82/
Option 43 is used to inform APs of WLC IP address(es) when the WLC is on a different subnet to the AP:
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/97066-dhcp-option-43-00.html
You can use it to tell the AP about primary/secondary/tertiary WLCs from the moment they're plugged in - no static config required.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide