09-13-2022 02:58 AM
Hello,
I am trying to add 2 Access points which we recently purchased to Controller.
can see AP's are getting DHCP and logs below on WLC. 10.158.177.51 and 10.158.177.50 are the AP's in question.
*spamApTask3: Sep 13 10:43:04.515: %DTLS-5-PEER_DISCONNECT: openssl_dtls.c:1004 DTLS peer 10.158.177.50 has closed connection.
*spamApTask3: Sep 13 10:43:04.442: %DTLS-5-ESTABLISHED_TO_PEER: openssl_dtls.c:880 DTLS connection established to 10.158.177.50
*spamApTask2: Sep 13 10:42:54.348: %DTLS-5-PEER_DISCONNECT: openssl_dtls.c:1004 DTLS peer 10.158.177.51 has closed connection.
*spamApTask2: Sep 13 10:42:54.197: %DTLS-5-ESTABLISHED_TO_PEER: openssl_dtls.c:880 DTLS connection established to 10.158.177.51
thanks
Mathew
Solved! Go to Solution.
09-14-2022 08:15 AM
- FYI : https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
M.
09-13-2022 03:20 AM
What firmware version running on your 2504 and what AP model you are trying to register to it
"show sysinfo" from WLC & "show version" from your AP will help us to see why it is failing.
I would check this compatibility matrix table as a starting point
HTH
Rasika
*** Pls rate all useful responses ***
09-13-2022 06:49 AM - edited 09-13-2022 06:50 AM
Wireless controller version: 8.3.150.0 and currently i dont have access to Access point. Will below details help ?
AP model: AIR-AP1832-E-K9
>show sysinfo
Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.3.150.0
Bootloader Version............................... 1.0.20
Field Recovery Image Version..................... 7.6.101.1
Firmware Version................................. PIC 16.0
OUI File Update Time............................. Sun Sep 07 10:44:07 IST 2014
Build Type....................................... DATA + WPS
System Name...................................... P185-
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1279
IP Address....................................... 10.158.191.251
IPv6 Address..................................... ::
Last Reset....................................... Software reset
System Up Time................................... 0 days 23 hrs 28 mins 28 secs
System Timezone Location......................... (GMT) London, Lisbon, Dublin, Edinburgh
--More-- or (q)uit
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180
Configured Country............................... GB - United Kingdom
Operating Environment............................ Commercial (0 to 40 C)
Internal Temp Alarm Limits....................... 0 to 65 C
Internal Temperature............................. +37 C
External Temperature............................. +42 C
Fan Status....................................... 5600 rpm
State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 1
Number of Active Clients......................... 116
OUI Classification Failure Count................. 603
Burned-in MAC Address............................ 20:3A:07:66:17:40
Maximum number of APs supported.................. 75
System Nas-Id....................................
WLC MIC Certificate Types........................ SHA1
09-13-2022 09:33 AM
>currently i dont have access to Access point.
You will probably need to find some ways to provide the ap boot process output
M.
09-14-2022 07:28 AM
can see below console messages
[*09/14/2022 13:58:41.9385] CAPWAP State: Discovery
[*09/14/2022 13:58:41.9584] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:58:41.9584] Discovery Response from 10.158.191.251
[*09/14/2022 13:58:51.0000]
[*09/14/2022 13:58:51.0000] CAPWAP State: DTLS Setup
[*09/14/2022 13:58:51.0000] dtls_connectionDB_add_connection: Number of DTLS connections exceeded two
[*09/14/2022 13:58:51.2699] dtls_load_ca_certs: LSC Root Certificate not present
[*09/14/2022 13:58:51.2699]
[*09/14/2022 13:58:51.2699] dtls_verify_con_cert: Controller certificate verification error
[*09/14/2022 13:58:51.2699] dtls_process_packet: controller cert verification failed
[*09/14/2022 13:58:51.2699] DTLS: Received packet 0x26f0000 caused DTLS to close connection
[*09/14/2022 13:58:51.2699] sendPacketToDtls: DTLS: Closing connection 0x2696000.
[*09/14/2022 13:58:51.2699]
[*09/14/2022 13:58:51.2699] Lost connection to the controller, going to restart CAPWAP...
[*09/14/2022 13:58:51.2699]
[*09/14/2022 13:58:51.2699] Restarting CAPWAP State Machine.
[*09/14/2022 13:58:51.2799] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*09/14/2022 13:58:51.2999] Failed to disconnect DTLS-CTRL session.
[*09/14/2022 13:58:51.2999]
[*09/14/2022 13:58:51.2999] CAPWAP State: DTLS Teardown
[*09/14/2022 13:58:51.3199] DTLS: Error while processing DTLS packet 0x2700000.
[*09/14/2022 13:58:55.9285]
[*09/14/2022 13:58:55.9285] CAPWAP State: Discovery
[*09/14/2022 13:58:55.9485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:58:55.9584] Discovery Response from 10.158.191.251
[*09/14/2022 13:59:06.0000]
[*09/14/2022 13:59:06.0000] CAPWAP State: DTLS Setup
[*09/14/2022 13:59:06.0000] dtls_connectionDB_add_connection: Number of DTLS connections exceeded two
[*09/14/2022 13:59:06.1999] dtls_load_ca_certs: LSC Root Certificate not present
[*09/14/2022 13:59:06.1999]
[*09/14/2022 13:59:06.2099] dtls_verify_con_cert: Controller certificate verification error
[*09/14/2022 13:59:06.2099] dtls_process_packet: controller cert verification failed
[*09/14/2022 13:59:06.2099] DTLS: Received packet 0x26f0000 caused DTLS to close connection
[*09/14/2022 13:59:06.2099] sendPacketToDtls: DTLS: Closing connection 0x26b4c00.
[*09/14/2022 13:59:06.2099]
[*09/14/2022 13:59:06.2099] Lost connection to the controller, going to restart CAPWAP...
[*09/14/2022 13:59:06.2099]
[*09/14/2022 13:59:06.2099] Restarting CAPWAP State Machine.
[*09/14/2022 13:59:06.2199] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*09/14/2022 13:59:06.2199] Failed to disconnect DTLS-CTRL session.
[*09/14/2022 13:59:06.2199]
[*09/14/2022 13:59:06.2199] CAPWAP State: DTLS Teardown
[*09/14/2022 13:59:06.2299] DTLS: Error while processing DTLS packet 0x26dd000.
[*09/14/2022 13:59:10.9285]
[*09/14/2022 13:59:10.9285] CAPWAP State: Discovery
[*09/14/2022 13:59:10.9485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:59:10.9485] Discovery Response from 10.158.191.251
[*09/14/2022 13:59:20.0000]
[*09/14/2022 13:59:20.0000] CAPWAP State: DTLS Setup
[*09/14/2022 13:59:20.0000] dtls_connectionDB_add_connection: Number of DTLS connections exceeded two
[*09/14/2022 13:59:20.2599] dtls_load_ca_certs: LSC Root Certificate not present
[*09/14/2022 13:59:20.2599]
[*09/14/2022 13:59:20.2599] dtls_verify_con_cert: Controller certificate verification error
[*09/14/2022 13:59:20.2599] dtls_process_packet: controller cert verification failed
[*09/14/2022 13:59:20.2699] DTLS: Received packet 0x26f0000 caused DTLS to close connection
[*09/14/2022 13:59:20.2699] sendPacketToDtls: DTLS: Closing connection 0x2696000.
[*09/14/2022 13:59:20.2699]
[*09/14/2022 13:59:20.2699] Lost connection to the controller, going to restart CAPWAP...
[*09/14/2022 13:59:20.2699]
[*09/14/2022 13:59:20.2799] DTLS: Error while processing DTLS packet 0x26f4000.
[*09/14/2022 13:59:20.2799] Restarting CAPWAP State Machine.
[*09/14/2022 13:59:20.2899] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*09/14/2022 13:59:20.3099] Failed to disconnect DTLS-CTRL session.
[*09/14/2022 13:59:20.3099]
[*09/14/2022 13:59:20.3099] CAPWAP State: DTLS Teardown
[*09/14/2022 13:59:24.9285]
[*09/14/2022 13:59:24.9285] CAPWAP State: Discovery
[*09/14/2022 13:59:24.9485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:59:24.9485] Discovery Response from 10.158.191.251
[*09/14/2022 13:59:35.0000]
[*09/14/2022 13:59:35.0000] CAPWAP State: DTLS Setup
[*09/14/2022 13:59:35.0000] dtls_connectionDB_add_connection: Number of DTLS connections exceeded two
[*09/14/2022 13:59:35.1999] dtls_load_ca_certs: LSC Root Certificate not present
[*09/14/2022 13:59:35.1999]
[*09/14/2022 13:59:35.2099] dtls_verify_con_cert: Controller certificate verification error
[*09/14/2022 13:59:35.2099] dtls_process_packet: controller cert verification failed
[*09/14/2022 13:59:35.2099] DTLS: Received packet 0x26dd000 caused DTLS to close connection
[*09/14/2022 13:59:35.2099] sendPacketToDtls: DTLS: Closing connection 0x26b4c00.
[*09/14/2022 13:59:35.2099]
[*09/14/2022 13:59:35.2099] Lost connection to the controller, going to restart CAPWAP...
[*09/14/2022 13:59:35.2099]
[*09/14/2022 13:59:35.2099] Restarting CAPWAP State Machine.
[*09/14/2022 13:59:35.2199] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*09/14/2022 13:59:35.2199] Failed to disconnect DTLS-CTRL session.
[*09/14/2022 13:59:35.2199]
[*09/14/2022 13:59:35.2199] CAPWAP State: DTLS Teardown
[*09/14/2022 13:59:35.2299] DTLS: Error while processing DTLS packet 0x26f0000.
[*09/14/2022 13:59:39.9285]
[*09/14/2022 13:59:39.9285] CAPWAP State: Discovery
[*09/14/2022 13:59:39.9385] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:59:39.9485] Discovery Response from 10.158.191.251
[*09/14/2022 13:59:49.0000]
[*09/14/2022 13:59:49.0000] CAPWAP State: DTLS Setup
[*09/14/2022 13:59:49.0000] dtls_connectionDB_add_connection: Number of DTLS connections exceeded two
[*09/14/2022 13:59:49.2699] dtls_load_ca_certs: LSC Root Certificate not present
[*09/14/2022 13:59:49.2699]
[*09/14/2022 13:59:49.2699] dtls_verify_con_cert: Controller certificate verification error
[*09/14/2022 13:59:49.2699] dtls_process_packet: controller cert verification failed
[*09/14/2022 13:59:49.2699] DTLS: Received packet 0x26dd000 caused DTLS to close connection
[*09/14/2022 13:59:49.2699] sendPacketToDtls: DTLS: Closing connection 0x2696000.
[*09/14/2022 13:59:49.2699]
[*09/14/2022 13:59:49.2699] Lost connection to the controller, going to restart CAPWAP...
[*09/14/2022 13:59:49.2699]
[*09/14/2022 13:59:49.2699] Restarting CAPWAP State Machine.
[*09/14/2022 13:59:49.2799] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*09/14/2022 13:59:49.2999] Failed to disconnect DTLS-CTRL session.
[*09/14/2022 13:59:49.2999]
[*09/14/2022 13:59:49.2999] CAPWAP State: DTLS Teardown
[*09/14/2022 13:59:49.3199] DTLS: Error while processing DTLS packet 0x2700000.
[*09/14/2022 13:59:53.9385]
[*09/14/2022 13:59:53.9385] CAPWAP State: Discovery
[*09/14/2022 13:59:53.9584] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*09/14/2022 13:59:53.9584] Discovery Response from 10.158.191.251
09-14-2022 08:15 AM
- FYI : https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
M.
09-29-2022 06:11 AM
Thank you and not sure if manufacturing certificate expiry is the issue here as one of it is expiring on 2037
(Cisco Controller) >show certificate all
--------------- Verification Certificates ---------------
Certificate Name: ACT2 EC CA cert
Subject Name :
O=Cisco, CN=ACT2 ECC SUDI CA
Issuer Name :
O=Cisco, CN=Cisco ECC Root CA
Serial Number (Hex):
02
Validity :
Start : Apr 4 08:26:13 2013 GMT
End : Apr 4 08:15:43.704 2053 GMT
Signature Algorithm :
ecdsa-with-SHA384
Hash key :
SHA1 Fingerprint : 32:78:95:b8:c4:e0:3c:ec:14:ae:d9:70:ef:99:c8:d9:34:0b:80:e6
SHA256 Fingerprint : f2:a3:92:57:1e:33:54:9a:b4:36:93:ef:55:67:fb:e6:0 7:8b:98:28:05:71:0c:26:fe:f6:d8:4a:c6:e8:4b:db
----------------------------
Certificate Name: ACT2 EC ROOT CA cert
--More-- or (q)uit
Subject Name :
O=Cisco, CN=Cisco ECC Root CA
Issuer Name :
O=Cisco, CN=Cisco ECC Root CA
Serial Number (Hex):
01
Validity :
Start : Apr 4 08:15:44 2013 GMT
End : Apr 4 08:15:44.704 2053 GMT
Signature Algorithm :
ecdsa-with-SHA384
Hash key :
SHA1 Fingerprint : 52:ec:7d:bb:5c:65:11:dd:c1:c5:46:db:bc:29:49:b5:ab: e9:d0:ee
SHA256 Fingerprint : 8d:b4:9f:4b:13:ee:ad:89:c5:cc:a2:9e:c0:33:72:59:1 4:45:86:5b:7a:fd:e8:2c:33:76:0f:1c:94:7f:3b:fe
----------------------------
Certificate Name: ACT2 RSA CA cert
Subject Name :
O=Cisco, CN=ACT2 SUDI CA
Issuer Name :
--More-- or (q)uit
O=Cisco Systems, CN=Cisco Root CA 2048
Serial Number (Hex):
61096E7D00000000000C
Validity :
Start : Jun 30 17:56:57 2011 GMT
End : May 14 20:25:42 2029 GMT
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : f6:96:9b:bd:48:e5:f6:12:5b:93:4d:01:e7:1f:e9:c2:7c: 6f:54:7e
SHA256 Fingerprint : 65:fa:b0:4a:ef:29:8b:e3:b9:42:e6:0e:1a:94:17:b9:c 0:c6:a1:8e:e0:45:f2:d1:11:4d:55:67:42:65:83:fb
----------------------------
Certificate Name: Cisco Manufacturing CA SHA2 cert
Subject Name :
O=Cisco, CN=Cisco Manufacturing CA SHA2
Issuer Name :
O=Cisco, CN=Cisco Root CA M2
Serial Number (Hex):
02
Validity :
--More-- or (q)uit
Start : Nov 12 13:50:58 2012 GMT
End : Nov 12 13:00:17 2037 GMT
Signature Algorithm :
sha256WithRSAEncryption
Hash key :
SHA1 Fingerprint : 90:b2:e0:6b:7a:d5:da:ff:cf:d4:31:87:29:09:f3:81:37: 47:1b:f8
SHA256 Fingerprint : 95:a0:e5:8a:99:8e:80:2a:c7:7a:d5:29:b9:ad:d8:e5:b 4:0c:f9:0a:f3:9a:85:6d:b5:14:a3:63:46:50:1e:c5
----------------------------
Certificate Name: Cisco Root CA SHA2 cert
Subject Name :
O=Cisco, CN=Cisco Root CA M2
Issuer Name :
O=Cisco, CN=Cisco Root CA M2
Serial Number (Hex):
01
Validity :
Start : Nov 12 13:00:18 2012 GMT
End : Nov 12 13:00:18 2037 GMT
Signature Algorithm :
sha256WithRSAEncryption
--More-- or (q)uit
Hash key :
SHA1 Fingerprint : 93:3d:63:3a:4e:84:0d:a4:c2:8e:89:5d:90:0f:d3:11:88: 86:f7:a3
SHA256 Fingerprint : cd:85:16:7b:39:35:e2:7b:cc:3b:0f:5f:a2:4c:84:57:8 8:2d:0b:b9:94:f8:82:69:a7:f7:28:29:d9:57:ea:e9
----------------------------
Certificate Name: Cisco Manufacturing CA SHA1 cert
Subject Name :
O=Cisco Systems, CN=Cisco Manufacturing CA
Issuer Name :
O=Cisco Systems, CN=Cisco Root CA 2048
Serial Number (Hex):
6A6967B3000000000003
Validity :
Start : Jun 10 22:16:01 2005 GMT
End : May 14 20:25:42 2029 GMT
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : e3:e7:83:d3:cc:9c:30:ae:de:ff:cd:eb:5e:cf:ee:08:ff: 8f:16:84
SHA256 Fingerprint : c7:4d:4b:4a:14:51:9d:d0:65:19:1d:96:84:5e:8d:4e:c 8:51:43:6b:c5:59:c4:a4:5e:24:ca:5c:7c:01:fc:d3
--More-- or (q)uit
----------------------------
Certificate Name: Cisco Root CA SHA1 cert
Subject Name :
O=Cisco Systems, CN=Cisco Root CA 2048
Issuer Name :
O=Cisco Systems, CN=Cisco Root CA 2048
Serial Number (Hex):
5FF87B282B54DC8D42A315B568C9ADFF
Validity :
Start : May 14 20:17:12 2004 GMT
End : May 14 20:25:42 2029 GMT
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : de:99:0c:ed:99:e0:43:1f:60:ed:c3:93:7e:7c:d5:bf:0e: d9:e5:fa
SHA256 Fingerprint : 83:27:bc:8c:9d:69:94:7b:3d:e3:c2:75:11:53:72:67:f 5:9c:21:b9:fa:7b:61:3f:af:bc:cd:53:b7:02:40:00
----------------------------
Certificate Name: Airespace Build CA cert
--More-- or (q)uit
Subject Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Build CA, emailAddress=support@bstormnetworks.com
Issuer Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Root CA, emailAddress=support@airespace.com
Serial Number (Hex):
01
Validity :
Start : Jul 31 13:41:31 2003 GMT
End : Apr 29 13:41:31 2013 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
SHA1 Fingerprint : e3:50:2f:94:f5:54:b9:e4:c2:b3:cb:3c:f8:5c:6b:ca:86: 0f:5f:8d
SHA256 Fingerprint : e6:50:49:d6:d5:c7:f2:3c:e7:e9:f6:5e:48:32:5d:f1:3 9:82:60:06:f7:61:41:a2:60:89:37:cc:53:b6:90:76
----------------------------
Certificate Name: Airspace device CA cert
Subject Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Device CA, emailAddress=support@airespace.com
Issuer Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Root CA, emailAddress=support@airespace.com
--More-- or (q)uit
Serial Number (Hex):
03
Validity :
Start : Apr 28 22:37:13 2005 GMT
End : Jan 26 22:37:13 2015 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
SHA1 Fingerprint : ae:25:ff:04:12:8a:62:f0:f8:4a:e8:76:b1:fe:c3:0d:78: dd:c6:1b
SHA256 Fingerprint : 92:09:e5:a9:e3:97:5c:6c:56:bc:9c:11:d4:8b:b1:c0:a 4:c5:10:97:e7:0b:02:51:ee:bd:07:61:48:f5:fb:79
----------------------------
Certificate Name: Airespace Root CA cert
Subject Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Root CA, emailAddress=support@airespace.com
Issuer Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Root CA, emailAddress=support@airespace.com
Serial Number (Hex):
0
Validity :
Start : Jul 31 13:41:22 2003 GMT
--More-- or (q)uit
End : Apr 29 13:41:22 2013 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
SHA1 Fingerprint : 94:ec:7d:ba:e4:e6:fb:f1:e0:44:03:81:cb:ed:ef:32:79: c9:90:b5
SHA256 Fingerprint : 92:62:22:3e:92:a6:48:07:0c:86:54:c4:6f:1b:04:af:5 b:1d:58:c5:7a:f2:bc:b8:76:db:41:5b:5e:7b:07:60
----------------------------
Certificate Name: Old Airespace CA cert
Subject Name :
C=US, ST=California, L=San Jose, O=airespace Inc, OU=none, CN=ca, email Address=support@airespace.com
Issuer Name :
C=US, ST=California, L=San Jose, O=airespace Inc, OU=none, CN=ca, email Address=support@airespace.com
Serial Number (Hex):
0
Validity :
Start : Feb 12 23:38:55 2003 GMT
End : Nov 11 23:38:55 2012 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
--More-- or (q)uit
SHA1 Fingerprint : 05:87:eb:cc:ab:55:a3:67:56:f4:59:75:cb:b1:65:47:45: 6d:84:9c
SHA256 Fingerprint : 96:b4:a7:47:1e:50:d8:38:4c:4d:4f:49:e3:53:61:f6:5 0:7c:a4:8f:78:07:7b:0f:9c:8c:40:6c:5b:94:40:f3
----------------------------
-------------- Identification Certificates --------------
Certificate Name: Cert for Web Authentication
Subject Name :
C=US, O=Cisco Systems Inc., OU=DeviceSSL (WebAuth), CN=1.1.1.1
Issuer Name :
C=US, O=Cisco Systems Inc., OU=DeviceSSL (WebAuth), CN=1.1.1.1
Serial Number (Hex):
07661740
Validity :
Start : Apr 22 23:00:01 2019 GMT
End : Apr 22 23:00:01 2029 GMT
Signature Algorithm :
sha256WithRSAEncryption
Hash key :
SHA1 Fingerprint : 00:a4:ca:1c:3b:a5:e8:d1:bc:d2:78:73:37:85:ed:d9:9c: e6:af:91
SHA256 Fingerprint : 41:62:7c:ed:79:1e:2f:47:41:23:ae:6b:24:d6:a2:a6:c 4:55:10:8c:cb:7e:2c:8d:0a:e6:b2:4f:bc:e2:e8:ef
--More-- or (q)uit
----------------------------
Certificate Name: Cert for Web Admin
Subject Name :
C=US, O=Cisco Systems Inc., OU=DeviceSSL (WebAdmin), CN=10.255.185.1
Issuer Name :
C=US, O=Cisco Systems Inc., OU=DeviceSSL (WebAdmin), CN=10.255.185.1
Serial Number (Hex):
07661740
Validity :
Start : Apr 22 23:00:01 2019 GMT
End : Apr 22 23:00:01 2029 GMT
Signature Algorithm :
sha256WithRSAEncryption
Hash key :
SHA1 Fingerprint : 41:47:40:e4:8b:a0:40:1e:87:40:0c:aa:d6:2a:1d:22:9b: 4a:1d:97
SHA256 Fingerprint : 2a:c7:ab:35:8e:9a:a1:02:8e:68:4e:30:6c:e0:b4:52:b 5:64:13:ae:40:94:25:c9:22:03:cf:f1:df:99:04:5e
----------------------------
Certificate Name: Cisco SHA1 device cert
--More-- or (q)uit
Subject Name :
C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AIR-CT2504-K9-203a 07661740, emailAddress=support@cisco.com
Issuer Name :
O=Cisco Systems, CN=Cisco Manufacturing CA
Serial Number (Hex):
6F454BA80000000D78FC
Validity :
Start : Sep 7 23:08:37 2012 GMT
End : Sep 7 23:18:37 2022 GMT
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : 35:cf:5a:c5:f5:79:b0:87:ac:08:d2:ef:ce:e3:1f:18:7b: 56:61:11
SHA256 Fingerprint : 89:ba:39:23:5b:0e:c6:13:7d:ea:0f:7a:08:ba:91:6d:1 e:de:5c:61:13:7b:99:10:1d:1b:ff:02:3a:6c:82:46
----------------------------
Certificate Name: Airespace Id cert
Subject Name :
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=MWAR Device, CN=0 00b85236d90, emailAddress=support@airespace.com
Issuer Name :
--More-- or (q)uit
C=US, ST=California, L=San Jose, O=Airespace Inc., OU=Engineering, CN=A irespace Device CA, emailAddress=support@airespace.com
Serial Number (Hex):
04EB8E
Validity :
Start : Mar 13 02:07:09 2006 GMT
End : Mar 10 02:07:09 2016 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
SHA1 Fingerprint : e3:68:a6:0f:89:46:b5:6b:37:eb:11:8c:d0:67:2e:51:e1: d8:5e:59
SHA256 Fingerprint : f1:21:a6:ef:a6:c3:67:06:73:90:12:55:1a:a3:49:e6:0 9:fa:8a:b6:22:2e:85:2f:48:b3:40:49:aa:97:c5:50
----------------------------
Certificate Name: Old Airespace Id cert
Subject Name :
C=US, ST=California, L=San Jose, O=airespace Inc, CN=000b85236d90, emai lAddress=support@airespace.com
Issuer Name :
C=US, ST=California, L=San Jose, O=airespace Inc, OU=none, CN=ca, email Address=support@airespace.com
Serial Number (Hex):
04C88C
Validity :
--More-- or (q)uit
Start : Mar 13 02:07:12 2006 GMT
End : Dec 11 02:07:12 2015 GMT
Signature Algorithm :
md5WithRSAEncryption
Hash key :
SHA1 Fingerprint : 51:0c:17:6d:94:2c:cf:e4:eb:66:ba:4b:26:0b:ed:11:26: 99:3c:b1
SHA256 Fingerprint : 9b:ec:a6:03:6b:7b:60:fe:17:e1:0e:4f:b4:2d:f3:b9:f 6:c5:07:bb:97:6d:db:1b:3e:7f:80:f0:d3:86:1a:20
----------------------------
09-29-2022 07:50 AM
Certificate Name: Cisco SHA1 device cert
Subject Name :
C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AIR-CT2504-K9-203a 07661740, emailAddress=support@cisco.com
Issuer Name :
O=Cisco Systems, CN=Cisco Manufacturing CA
Serial Number (Hex):
6F454BA80000000D78FC
Validity :
Start : Sep 7 23:08:37 2012 GMT
End : Sep 7 23:18:37 2022 GMT <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Signature Algorithm :
sha1WithRSAEncryption
Hash key :
SHA1 Fingerprint : 35:cf:5a:c5:f5:79:b0:87:ac:08:d2:ef:ce:e3:1f:18:7b: 56:61:11
SHA256 Fingerprint : 89:ba:39:23:5b:0e:c6:13:7d:ea:0f:7a:08:ba:91:6d:1 e:de:5c:61:13:7b:99:10:1d:1b:ff:02:3a:6c:82:46
09-14-2022 07:46 AM
Access Point output
APC4B9.CDEC.2EE8#show run
AP Name : APC4B9.CDEC.2EE8
Admin State : Enabled
AP Mode : Local
AP Submode : None
Location : default location
Reboot Reason : Reload command
Primary controller name :
Primary controller IP :
Secondary controller name :
Secondary controller IP :
Tertiary controller name :
Tertiary controller IP :
AP join priority : 1
IP Prefer-mode : Unconfigured
CAPWAP UDP-Lite : Unconfigured
Last Joined Controller name:
DTLS Encryption State : Disabled
Discovery Timer : 10
Heartbeat Timer : 30
CDP State : Enabled
Watchdog monitoring : Enabled
RRM State : Enabled
LSC State : Disabled
SSH State : Disabled
AP Username : Cisco
Session Timeout : 300
Extlog Host : 255.255.255.255
Extlog Flags : 0
Extlog Status Interval : 0
Syslog Host : 255.255.255.255
Syslog Facility : 0
Syslog Level : errors
Core Dump TFTP Ip Addr : 0.0.0.0
Core Dump Flag: : 0
Core Dump Filename :
WLC Link LAG status : Disabled
AP Link LAG status : Disabled
AP WSA Mode : Disabled
APC4B9.CDEC.2EE8#show version
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
CO/label/corsica], (ap1g4), [cheetah-build5:/san/BUILD/workspace/83MR5_Cheetah_C--More--
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu Apr 11 13:30:13 PDT 2019
ROM: Bootstrap program is U-Boot boot loader
BOOTLDR: U-Boot boot loader Version 31
APC4B9.CDEC.2EE8 uptime is 0 days, 3 hours, 58 minutes
Last reload time : Mon Sep 12 09:28:30 UTC 2022
Last reload reason : unknown
cisco AIR-AP1832I-E-K9 ARMv7 Processor rev 0 (v7l) with 967420/734068K bytes of memory.
Processor board ID KWC210708TV
AP Running Image : 8.3.150.0
Primary Boot Image : 8.3.150.0
Backup Boot Image : 8.2.141.0
2 Gigabit Ethernet interfaces
2 802.11 Radios
Radio FW version : c5d79906494f60ee03674c0779e5c30b
NSS FW version : NSS.AK.1.0.c10-00017-E_custC-1.67978.1
Base ethernet MAC Address : C4:B9:CD:EC:2E:E8
Part Number : 0-0000-00
PCA Assembly Number : 074-104313-02
PCA Revision Number : 01
PCB Serial Number : KWC210708TV
Top Assembly Part Number : 000-00000-00
Top Assembly Serial Number : KWC210708TV
Top Revision Number : A0
Product/Model Number : AIR-AP1832I-E-K9
09-14-2022 08:32 AM
@mathewmnu7 did you carefully read and follow the field notice as per @marce1000 above?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide