cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3456
Views
15
Helpful
11
Replies

My ap2802i will not join wlc 2504

ronald.wilson1
Level 1
Level 1

Recently I upgraded wlc 2504 to version 8.5.  My new ap2802i version 8.4 will not join.  With my old version of wlc 7.6 I could see the access points attempting to join, but now I see nothing.  Could I have a conflict with versions of software?

 

So i was just able to force the join, but from the controller the AP still shows it is not joined.  Any suggestions??

 

11 Replies 11

Leo Laohoo
Hall of Fame
Hall of Fame
Console into the AP and reboot. Post the entire boot-up process. We want to see what the AP is doing.
Is the AP getting a valid IP address?

Yes it receives an IP.

======================================================

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.14
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-g729a7b4 (Dec 05 2016 - 23:44:32) SDK version: 2015_T2.0p10

Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB
NAND: 256 MiB
SF: Detected N25Q32A with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fedc000:0x3ffad730
BSS: 0x3ffef1d4
Stack: 0x3f9cbf20
Heap: 0x3f9cc000:0x3fedc000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 53048681 (0x03297569)...
Done
SF: Detected N25Q32A with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2017-05-18 6:27:02 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 53047673 Bytes = 50.6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4112736 Bytes = 3.9 MiB
Image 1: 48919169 Bytes = 46.7 MiB
Image 2: 15749 Bytes = 15.4 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x05293434
Loading Multi-File Image ... OK
OK
Loading Device Tree to 01ff9000, end 01fffd84 ... OK

Starting Device Tree update ('fdt_skip_update' = no)
Unable to update property /soc/gop/mac1:local-mac-address, err=FDT_ERR_NOSPACE
Unable to update property /soc/gop/mac2:local-mac-address, err=FDT_ERR_NOSPACE

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
WARNING: could not set reg FDT_ERR_NOSPACE.
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:15.8800] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:15.9900] Memory: 980272K/1048576K available (5540K kernel code, 413K rwdata, 2568K rodata, 347K init, 465K bss, 68304K reserved)
[01/01/1970 00:00:16.1400] CPU1: Booted secondary processor
[01/01/1970 00:00:16.2100] buginf tty flushing thread started, ttyport=bf38c400
[01/01/1970 00:00:16.4900] m25p80 spi1.0: found n25q032a, expected n25q032
[01/01/1970 00:00:17.8800] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:18.0460] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:18.0652] Made it into bootsh: May 17 2017 22:35:40
[*01/01/1970 00:00:18.0771] bootsh build T-ea744460b77c6aa805022a071636bbe91bfbef81-gea744460-vipendya
init started: BusyBox v1.23.2 (2017-05-17 22:19:00 PDT)
Jan 1 00:00:21 FIPS[3153]: *** shell: FIPS Mode = disabled ***

 

User Access Verification
Username: [*01/01/1970 00:00:23.3669]
[*01/01/1970 00:00:23.3669]
[*01/01/1970 00:00:23.3669]
[*01/01/1970 00:00:23.3669]
[*01/01/1970 00:00:23.3669] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:23.3669] Authenticating SN:FDO21432B78
[*01/01/1970 00:00:23.3673]
[*01/01/1970 00:00:23.3673] (ACT2Boot) Hardware is Cisco (c) authentic :-)
[*01/01/1970 00:00:23.3673]
[*01/01/1970 00:00:23.3674] Seeding /dev/urandom from ACT2
[*10/28/2017 23:59:59.0065] Last reload time: Jul 28 23:07:38 2018
[*07/28/2018 23:07:38.0001] Setting system time Sat Jul 28 23:07:38 UTC 2018
[*07/28/2018 23:07:38.1147] Loading kernel crypto modules
[*07/28/2018 23:07:38.2363] GCM-128 POST passed
[*07/28/2018 23:07:38.2364] GCM-256 POST passed
[*07/28/2018 23:07:38.4003] Active version: 8.4.100.0
[*07/28/2018 23:07:38.4016] Backup version: 0.0.0.0
[*07/28/2018 23:07:38.5641] devi[07/28/2018 23:07:38.5800] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
ce wired0 entere[07/28/2018 23:07:38.6700] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
d promiscuous mode
[*07/28/2018 23:07:39.9416] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*07/28/2018 23:07:45.0323] Firmware download complete
[*07/28/2018 23:07:45.0504] FIPS enc aes-ccmp Verified
[*07/28/2018 23:07:45.0505] FIPS dec aes-ccmp Verified
[*07/2[07/28/2018 23:07:45.1900] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
8/2018 23:07:45.[07/28/2018 23:07:45.2900] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
0506] FIPS enc aes-ccmp-256 Verified
[*07/28/2018 23:07:45.0507] FIPS dec aes-ccmp-256 Verified
[*07/28/2018 23:07:45.0508] FIPS enc aes-gcmp Verified
[*07/28/2018 23:07:45.0509] FIPS dec aes-gcmp Verified
[*07/28/2018 23:07:45.0511] FIPS enc aes-gcmp-256 Verified
[*07/28/2018 23:07:45.0512] FIPS dec aes-gcmp-256 Verified
[*07/28/2018 23:07:46.5602] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*07/28/2018 23:07:50.8739] Firmware download complete
[*07/28/2018 23:07:50.8920] FIPS enc aes-ccmp Verified
[*07/28/2018 23:07:50.8921] FIPS dec aes-ccmp Verified
[*07/28/2018 23:07:50.8922] FIPS enc aes-ccmp-256 Verified
[*07/28/2018 23:07:50.8923] FIPS dec aes-ccmp-256 Verified
[*07/28/2018 23:07:50.8924] FIPS enc aes-gcmp Verified
[*07/28/2018 23:07:50.8925] FIPS dec aes-gcmp Verified
[*07/28/2018 23:07:50.8926] FIPS enc aes-gcmp-256 Verified
[*07/28/2018 23:07:50.8927] FIPS dec aes-gcmp-256 Verified
[*07/28/2018 23:07:51.3564] ifconfig: SIOCGIFFLAGS: No such device
[*07/28/2018 23:07:51.4786] Initializing NSS Firmware
[07/28/2018 23:07:54.6200] Disabling lock debugging due to kernel taint
[*07/28/2018 23:07:54.6282] stile_lm_ft_barbados: module license 'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[*07/28/2018 23:07:54.7230] stile module dp init successfully
[*07/28/2018 23:07:54.7230] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR VERSION:module build date: Mar 6 2017 at 12:16:50
[*07/28/2018 23:07:56.2169] Loading nf_conntrack...
[*07/28/2018 23:07:56.2352] Loading nf_conntrack_ftp...
[*07/28/2018 23:07:56.2466] Loading nf_defrag_ipv4...
[*07/28/2018 23:07:56.2576] Loading nf_defrag_ipv6...
[*07/28/2018 23:07:56.2689] Loading nf_conntrack_ipv4...
[*07/28/2018 23:07:56.2802] Loading nf_conntrack_ipv6...
[*07/28/2018 23:07:56.2915] Loading nf_conntrack_irc...
[*07/28/2018 23:07:56.3030] Loading nfnetlink...
[*07/28/2018 23:07:56.3141] Loading nf_conntrack_netlink...
[*07/28/2018 23:07:56.3256] Loading nf_conntrack_sip...
[*07/28/2018 23:07:56.3371] Loading nf_nat...
[*07/28/2018 23:07:56.3486] Loading nf_nat_ftp...
[*07/28/2018 23:07:56.3606] Loading nf_nat_ipv4...
[*07/28/2018 23:07:56.3720] Loading nf_nat_irc...
[*07/28/2018 23:07:56.3833] Loading nf_nat_sip...
[*07/28/2018 23:07:56.3944] Loading x_tables...
[*07/28/2018 23:07:56.4062] Loading xt_conntrack...
[*07/28/2018 23:07:56.4175] Loading xt_state...
[*07/28/2018 23:07:56.4286] Loading xt_nat...
[*07/28/2018 23:07:56.4407] Loading xt_tcpudp...
[*07/28/2018 23:07:56.4518] Loading ip_tables...
[*07/28/2018 23:07:56.4632] Loading iptable_filter...
[*07/28/2018 23:07:56.4747] Loading iptable_mangle...
[*07/28/2018 23:07:56.4860] Loading iptable_nat...
[*07/28/2018 23:07:56.4975] Loading ip6_tables...
[*07/28/2018 23:07:56.5090] Loading ip6t_REJECT...
[*07/28/2018 23:07:56.5203] Loading ip6t_ipv6header...
[*07/28/2018 23:07:56.5315] Loading ip6table_filter...
[*07/28/2018 23:07:56.5429] Loading ip6table_mangle...
[*07/28/2018 23:07:56.5542] Loading ipt_MASQUERADE...
[*07/28/2018 23:07:56.5657] Loading ipt_REJECT...
[*07/28/2018 23:07:56.5770] Loading iptable_raw...
[*07/28/2018 23:07:56.5886] Loading ip6table_raw...
[*07/28/2018 23:07:56.5998] Loading bridge...
[*07/28/2018 23:07:56.6151] Loading nfnetlink_log...
[*07/28/2018 23:07:56.6267] Loading xt_mark...
[*07/28/2018 23:07:56.6381] Loading xt_policy...
[*07/28/2018 23:07:56.6496] xt_tcpudp is already loaded
[*07/28/2018 23:07:56.6496] Loading ebtables...
[*07/28/2018 23:07:56.6611] Loading [07/28/2018 23:07:58.4000] wired0 emac 2: link up
ebt_ip...
[*07/[07/28/2018 23:07:58.4700] wired0: link up
28/2018 23:07:56.6727] Loading ebt_ip6...
[*07/28/2018 23:07:56.6841] Loading ipt_ULOG...
[*07/28/2018 23:07:56.8117]
[*07/28/2018 23:07:56.8155] boot 3 build T-ea744460b77c6aa805022a071636bbe91bfbef81-gea744460-vipendya board barbados mac 38:0E:4D:F6:A0:76
[*07/28/2018 23:07:56.8185] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*07/28/2018 23:07:56.8185] Module: aes_generic .text=0x7f004000 data=0x7f00a460 bss=
[*07/28/2018 23:07:56.8185] Module: sha256_generic .text=0x7f00e000 data=0x7f00fbdc bss=
[*07/28/2018 23:07:56.8186] Module: sha512_generic .text=0x7f014000 data=0x7f0158c8 bss=
[*07/28/2018 23:07:56.8186] Module: hmac .text=0x7f019000 data=0x7f0195e8 bss=
[*07/28/2018 23:07:56.8186] Module: sha1_generic .text=0x7f01d000 data=0x7f01d2cc bss=
[*07/28/2018 23:07:56.8186] Module: sha1_arm .text=0x7f021000 data=0x7f021850 bss=
[*07/28/2018 23:07:56.8186] Module: gf128mul .text=0x7f025000 data= bss=
[*07/28/2018 23:07:56.8186] Module: cbc .text=0x7f02a000 data=0x7f02a4f4 bss=
[*07/28/2018 23:07:56.8186] Module: ctr .text=0x7f02e000 data=0x7f02e7c8 bss=
[*07/28/2018 23:07:56.8186] Module: ghash_generic .text=0x7f032000 data=0x7f032268 bss=
[*07/28/2018 23:07:56.8186] Module: seqiv .text=0x7f036000 data=0x7f036654 bss=
[*07/28/2018 23:07:56.8186] Module: mbedtls .text=0x7f03a000 data=0x7f0415e0 bss=0x7f041850
[*07/28/2018 23:07:56.8186] Module: aptrace .text=0x7f046000 data=0x7f04dc50 bss=0x7f04e0b8
[*07/28/2018 23:07:56.8186] Module: ap8x .text=0x7f055000 data=0x7f1065f4 bss=0x7f10ddf0
[*07/28/2018 23:07:56.8186] Module: mv_nss_api .text=0x7f2e8000 data=0x7f336cd8 bss=0x7f3380e8
[*07/28/2018 23:07:56.8186] Module: proclikefs .text=0x7f349000 data= bss=0x7f349b80
[*07/28/2018 23:07:56.8186] Module: stile_lm_ft .text= data= bss=
[*07/28/2018 23:07:56.8186] Module: stile_lm_dp .text= data= bss=
[*07/28/2018 23:07:56.8186] Module: mtdoops .text=0x7fe21000 data=0x7fe21e34 bss=0x7fe21fa8
[*07/28/2018 23:07:56.8186] Module: ipv6 .text=0x7fe26000 data=0x7fe5ba80 bss=0x7fe5d640
[*07/28/2018 23:07:56.8186] Module: llc .text=0x7fe84000 data=0x7fe84858 bss=0x7fe849f4
[*07/28/2018 23:07:56.8186] Module: stp .text=0x7fe89000 data=0x7fe89280 bss=0x7fe8943c
[*07/28/2018 23:07:56.8187] Module: nf_conntrack .text=0x7fe8d000 data=0x7fe96b44 bss=0x7fe97850
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_ftp .text=0x7fea7000 data= bss=0x7fea8380
[*07/28/2018 23:07:56.8187] Module: nf_defrag_ipv4 .text=0x7feac000 data=0x7feac188 bss=
[*07/28/2018 23:07:56.8187] Module: nf_defrag_ipv6 .text=0x7feb0000 data=0x7feb1060 bss=0x7feb12c0
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_ipv4 .text=0x7feb7000 data=0x7feb8d88 bss=0x7feb9218
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_ipv6 .text=0x7febf000 data=0x7fec01bc bss=
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_irc .text=0x7fec5000 data=0x7fec557c bss=0x7fec5a24
[*07/28/2018 23:07:56.8187] Module: nfnetlink .text=0x7fec9000 data=0x7fec9a34 bss=0x7fec9bac
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_netlink .text=0x7fece000 data=0x7fed1a5c bss=
[*07/28/2018 23:07:56.8187] Module: nf_conntrack_sip .text=0x7fed7000 data= bss=0x7fedaf44
[*07/28/2018 23:07:56.8187] Module: nf_nat .text=0x7fee0000 data=0x7fee1f74 bss=0x7fee2194
[*07/28/2018 23:07:56.8187] Module: nf_nat_ftp .text=0x7fee8000 data=0x7fee8320 bss=
[*07/28/2018 23:07:56.8187] Module: nf_nat_ipv4 .text=0x7feec000 data= bss=0x7feec91c
[*07/28/2018 23:07:56.8187] Module: nf_nat_irc .text=0x7fef0000 data=0x7fef0254 bss=
[*07/28/2018 23:07:56.8187] Module: nf_nat_sip .text=0x7fef4000 data=0x7fef57d8 bss=
[*07/28/2018 23:07:56.8187] Module: x_tables .text=0x7fef9000 data=0x7fefb184 bss=0x7fefb2fc
[*07/28/2018 23:07:56.8187] Module: xt_conntrack .text=0x7ff02000 data= bss=
[*07/28/2018 23:07:56.8187] Module: xt_state .text=0x7ff06000 data= bss=
[*07/28/2018 23:07:56.8187] Module: xt_nat .text=0x7ff0a000 data= bss=
[*07/28/2018 23:07:56.8188] Module: xt_tcpudp .text=0x7ff0e000 data= bss=
[*07/28/2018 23:07:56.8188] Module: ip_tables .text=0x7ff12000 data=0x7ff13eb4 bss=0x7ff1412c
[*07/28/2018 23:07:56.8188] Module: iptable_filter .text=0x7ff18000 data=0x7ff181b0 bss=
[*07/28/2018 23:07:56.8188] Module: iptable_mangle .text=0x7ff1c000 data=0x7ff1c210 bss=
[*07/28/2018 23:07:56.8188] Module: iptable_nat .text=0x7ff20000 data=0x7ff205bc bss=
[*07/28/2018 23:07:56.8188] Module: ip6_tables .text=0x7ff24000 data=0x7ff25f50 bss=0x7ff261c8
[*07/28/2018 23:07:56.8188] Module: ip6t_REJECT .text=0x7ff2a000 data= bss=
[*07/28/2018 23:07:56.8188] Module: ip6t_ipv6header .text=0x7ff2e000 data= bss=
[*07/28/2018 23:07:56.8188] Module: ip6table_filter .text=0x7ff32000 data=0x7ff32174 bss=
[*07/28/2018 23:07:56.8188] Module: ip6table_mangle .text=0x7ff36000 data=0x7ff36284 bss=
[*07/28/2018 23:07:56.8188] Module: ipt_MASQUERADE .text=0x7ff3a000 data=0x7ff3a2a8 bss=
[*07/28/2018 23:07:56.8188] Module: ipt_REJECT .text=0x7ff3e000 data= bss=
[*07/28/2018 23:07:56.8188] Module: iptable_raw .text=0x7ff42000 data=0x7ff4217c bss=
[*07/28/2018 23:07:56.8188] Module: ip6table_raw .text=0x7ff46000 data=0x7ff46140 bss=
[*07/28/2018 23:07:56.8189] Module: bridge .text=0x7ff4a000 data=0x7ff5708c bss=0x7ff575e0
[*07/28/2018 23:07:56.8189] Module: nfnetlink_log .text=0x7ff66000 data=0x7ff675f4 bss=0x7ff67800
[*07/28/2018 23:07:56.8189] Module: xt_mark .text=0x7ff6d000 data= bss=
[*07/28/2018 23:07:56.8189] Module: xt_policy .text=0x7ff71000 data= bss=
[*07/28/2018 23:07:56.8189] Module: ebtables .text=0x7ff75000 data=0x7ff785ec bss=
[*07/28/2018 23:07:56.8189] Module: ebt_ip .text=0x7ff7c000 data= bss=
[*07/28/2018 23:07:56.8189] Module: ebt_ip6 .text=0x7ff80000 data= bss=
[*07/28/2018 23:07:56.8189] Module: ipt_ULOG .text=0x7ff84000 data=0x7ff848a0 bss=
[*07/28/2018 23:07:56.8189] Module: crc_itu_t .text=0x7ff88000 data= bss=
[*07/28/2018 23:07:56.8190] Module: lowmemorykiller .text=0x7ff8c000 data=0x7ff8c2f4 bss=0x7ff8c4a0
[*07/28/2018 23:07:56.8190] Module: p8022 .text=0x7ff90000 data= bss=
[*07/28/2018 23:07:56.8190] Module: psnap .text=0x7ff94000 data=0x7ff94344 bss=0x7ff944c4
[*07/28/2018 23:07:56.8190] Module: rng_core .text=0x7ff98000 data=0x7ff98818 bss=0x7ff989d8
[*07/28/2018 23:07:56.8190] Module: udf .text=0x7ff9c000 data=0x7ffac058 bss=0x7ffac1d4
[*07/28/2018 23:07:56.8420] barbados /tmp/SC4_1dbm.txt
[*07/28/2018 23:07:56.9496] Last reload reason : 0: unknown
[*07/28/2018 23:08:09.0069] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down
[*07/28/2018 23:08:09.0192] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up
[*07/28/2018 23:08:09.0197] ip6_port srcr6, ip6local fe80::3a0e:4dff:fef6:a076, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 3(slaac)
[*07/28/2018 23:08:19.4605] Create symlink /dev/mic_cert result 0
[*07/28/2018 23:08:19.4605] Loading certificates from storage...
[*07/28/2018 23:08:19.4742] SKU to radio FW
[*07/28/2018 23:08:19.7706] Generating key, this may take a while...
[*07/28/2018 23:08:20.9018] Public key portion is:
[*07/28/2018 23:08:20.9018] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXVqNMjVceURTTNwGRLPIXcoggG0Q2RNLLZVDIka9oDehpAlQWlXu00niihq2xTuZ9wxvd7WJvpkRhqvSu8xJefnsoZFVKWo+YaJ5aCxWfHNKmJ/8lQVuPdK6gWdmqHVXm8PLDC1Agmj/tcloCJhrMBcjRKi1sByEXfSCnSIwSZ9J6d6u4ZLMF8sGN+F+8mecxy05EK+riVZ+750ET0MJRDhGvRKLfy9Cmltt4uew2xD8DEUUBh5fcnmuKzJ+3jxiWUDso3X4L0ftyXn+CuslJ7tIgOjno8X1HLRj0GlOIgUk86qyZE0UApqmxIwgMCVXgHzVJyiuTwX555Rgcm699 root@m380E4DF6A076
[*07/28/2018 23:08:20.9019] Fingerprint: md5 61:59:11:46:3f:a5:00:33:28:ba:4e:7c:97:9b:04:a4
[*07/28/2018 23:08:24.1403] starting tam services using ACT2...
[*07/28/2018 23:08:24.5115] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_XOR_5G_FILE__/\/radio_fw\/X5.csv/g' -e 's/__EVM_POWER_XOR_5G_FILE__/\/radio_fw\/EVM_X5.csv/g' -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/41/g' -e 's/__PRODUCT_ID__/AIR-AP2802I-B-K9/g' -e 's/__AP_TYPE__/56/g' -e 's/__WIRELESS_MAC__/00:5D:73:C6:39:20/g' -e 's/__WIRED_MAC__/38:0E:4D:F6:A0:76/g' -e 's/__WIRED1_MAC__/38:0E:4D:F6:A0:76/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*07/28/2018 23:08:24.6231] Password for 'Admin' changed
[*07/28/2018 23:08:25.5026] CRIT-MeshControl:
[*07/28/2018 23:08:25.5026] Mesh Control: skipped adding wired1 backhaul
[*07/28/2018 23:08:25.8248] Stopped Radio 1
[*07/28/2018 23:08:25.8399] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:26.3998] Stopped Radio 0
[*07/28/2018 23:08:26.4121] DOT11_DRV[0]: set_channel Channel set to 6
[*07/28/2018 23:08:26.6521]
[*07/28/2018 23:08:26.6521] BLE initialized on Board PID AIR-AP2802I-B-K9, AP type 38
[*07/28/2018 23:08:27.6417] DOT11_CFG[0] Radio Mode is changed from Local to FlexConnect
[*07/28/2018 23:08:27.6422] Radio0 not started, not enough POE power
[*07/28/2018 23:08:27.6426] DOT11_CFG[1] Radio Mode is changed from Local to FlexConnect
[*07/28/2018 23:08:27.6429] Radio1 not started, not enough POE power
[*07/28/2018 23:08:27.8974] DOT11_DRV[0]: set_channel Channel set to 1
[*07/28/2018 23:08:28.1968] DOT11_DRV[0]: set_channel Channel set to 1
[*07/28/2018 23:08:28.2067] DOT11_DRV[0]: set_channel Channel set to 1
[*07/28/2018 23:08:28.3331] ethernet_port wired0, ip 10.0.80.22, netmask 255.255.255.0, gw 10.0.80.1, mtu 1500, bcast 10.0.80.255, dns1 10.0.80.1, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*07/28/2018 23:08:28.6459] Radio0 not started, not enough POE power
[*07/28/2018 23:08:28.6489] bftype is 6
[*07/28/2018 23:08:28.6586] DOT11_DRV[0]: set_channel Channel set to 1
[*07/28/2018 23:08:28.9697] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:29.2680] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:29.5712] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:29.5808] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:30.0509] Radio1 not started, not enough POE power
[*07/28/2018 23:08:30.0540] bftype is 6
[*07/28/2018 23:08:30.0637] DOT11_DRV[1]: set_channel Channel set to 36
[*07/28/2018 23:08:34.2017] waiting for POE negotiation to complete
[*07/28/2018 23:08:34.2017]
[*07/28/2018 23:08:39.2021] waiting for POE negotiation to complete
[*07/28/2018 23:08:39.2022]
[*07/28/2018 23:08:40.5295] SYS-COND: AP is in fair condition
[*07/28/2018 23:08:41.2095] DOT11_CFG[0] Radio Mode is changed from FlexConnect to FlexConnect
[*07/28/2018 23:08:41.2103] DOT11_CFG[1] Radio Mode is changed from FlexConnect to FlexConnect
[*07/28/2018 23:08:41.2305] AP IPv4 Address updated from 0.0.0.0 to 10.0.80.22
[*07/28/2018 23:09:15.6844] chatter: tohost_virtual :: ToHost: device 'virtual' went down
[*07/28/2018 23:09:15.7243] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down
[*07/28/2018 23:09:15.7643] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down
[*07/28/2018 23:09:15.7943] chatter: tohost_vlan2 :: ToHost: device 'vlan2' went down
[*07/28/2018 23:09:15.8243] chatter: tohost_vlan3 :: ToHost: device 'vlan3' went down
[*07/28/2018 23:09:15.8544] chatter: tohost_vlan4 :: ToHost: device 'vlan4' went down
[*07/28/2018 23:09:15.8943] chatter: tohost_vlan5 :: ToHost: device 'vlan5' went down
[*07/28/2018 23:09:15.9344] chatter: tohost_vlan6 :: ToHost: device 'vlan6' went down
[*07/28/2018 23:09:15.9643] chatter: tohost_vlan7 :: ToHost: device 'vlan7' went down
[*07/28/2018 23:09:15.9943] chatter: tohost_vlan8 :: ToHost: device 'vlan8' went down
[*07/28/2018 23:09:16.0344] chatter: t
Cryptographic library self-test....
Testing SHA1 Short Message 1
Testing SHA256 Short Message 1
Testing SHA384 Short Message 1
SHA1 POST PASSED
Testing HMAC SHA1 Short Message 1
Testing HMAC SHA2 Short Message 1
Testing HMAC SHA384 Short Message 1
passed!

XML config selected
Validating XML configuration
Cisco is a trademark of Cisco Systems, Inc.
Software Copyright Cisco Systems, Inc. All rights reserved.

Cisco AireOS Version 8.4.100.0
Initializing OS Services: ok
Initializing Serial Services: ok
Initializing Network Services: ok
Starting SSHD: ok
Starting Statistics Service: ok
Starting ARP Services: ok
Starting Trap Manager: ok
Starting Network Interface Management Services: ok
Starting System Services: ok
Starting SNMP services: ok
Starting Fastpath Hardware Acceleration: ok
Starting Switching Services: ok
Starting QoS Services: ok
Starting Policy Manager: ok
Starting Data Transport Link Layer: ok
Starting Access Control List Services: ok
Starting System Interfaces: ok
Starting Client Troubleshooting Service: ok
Starting Certificate Database: ok
Starting VPN Services: ok
Starting Management Frame Protection: ok
Starting DNS Services: ok
ok
Starting LWAPP: ok
Starting CAPWAP: ok
Starting LOCP: ok
Starting Security Services: ok
Starting Policy Manager: ok
Starting Authentication Engine: ok
Starting Mobility Management: ok
Starting Capwap Ping Component: ok
Starting AVC Services: ok
Starting AVC Flex Services: ok
Starting Virtual AP Services: ok
Starting AireWave Director: ok
Starting Network Time Services: ok
Starting Cisco Discovery Protocol: ok
Starting Broadcast Services: ok
Starting DHCP Server: ok
Starting IDS Signature Manager: ok
Starting RFID Tag Tracking: ok
Starting RF Profiles: ok
Starting Mesh Services: ok
Starting TSM: ok
Starting CIDS Services: ok
Starting Ethernet-over-IP: ok
Starting DTLS server: enabled in CAPWAP
Starting CleanAir: ok
Starting WIPS: ok
Starting SSHPM LSC PROV LIST: ok
Starting RRC Services: ok
Starting SXP Services: ok
Starting Alarm Services: ok
Starting FMC HS: ok
Starting FLEXEXPRESS ConfigSync Task: ok
Starting HTTP Image Download Task: ok
Starting Tunnel Services New: ok
Starting Portal Server Services: ok
Starting Management Services:
Web Server: CLI: Secure Web: ok
Starting IPSec Profiles component: ok

(Cisco Controller)


@ronald.wilson1 wrote:

Cisco AireOS Version 8.4.100.0


I don't see any signs that this AP has joined the controller running 8.5.X.X. 


@ronald.wilson1 wrote:

[*07/28/2018 23:08:28.3331] ethernet_port wired0, ip 10.0.80.22, netmask 255.255.255.0, gw 10.0.80.1, mtu 1500, bcast 10.0.80.255, dns1 10.0.80.1, vid 0, static_ip_failover false, dhcp_vlan_failover false


I also don't see any signs that the AP is attempting to find the controller. 

So, can the AP ping the controller Management IP address?  If the answer is yes, then enter the command "capwap ap primary-base <CONTROLLER NAME> <MANAGEMENT IP ADDRESS>".

So the AP is able to ping the controller managment IP. I ran the previous command and attached the results to my first post.

The controller receives the join request, and responds, but AP will not respond after that. Since everything is on the sama vlan, no firewall should be blocking traffic.

Kindly post the complete output to the following commands:
1. WLC: sh sysinfo;
2. WLC: sh time; and
3. AP: sh version

What other AP’s do you have joined?

-Scott
*** Please rate helpful posts ***

No other AP's are able to join the wlc.  

Here are the post for the wlc and ap.("show version" will not work on the AP so I did "sh sysinfo"):

 

WLC:

Manufacturer's Name.............................. Cisco Systems Inc.

Product Name..................................... Cisco Controller

Product Version.................................. 8.5.131.0

Bootloader Version............................... 1.0.20

Field Recovery Image Version..................... 7.6.101.1

Firmware Version................................. PIC 20.0

 

 

OUI File Last Update Time........................ Sun Sep 07 10:44:07 IST 2014

 

 

Build Type....................................... DATA + WPS

 

System Name......................................

System Location..................................

System Contact...................................

System ObjectID.................................. 1.3.6.1.4.1.9.1.1279

IP Address....................................... 10.0.80.5

IPv6 Address..................................... ::

Last Reset....................................... Software reset

System Up Time................................... 2 days 17 hrs 41 mins 29 secs

System Timezone Location......................... (GMT -6:00) Central Time (US and Canada)

 

--More-- or (q)uit

System Stats Realtime Interval................... 5

System Stats Normal Interval..................... 180

 

Configured Country............................... US  - United

StatesOperating Environment............................ Commercial (0 to 40 C)

Internal Temp Alarm Limits....................... 0 to 65 C

Internal Temperature............................. +38 C

External Temperature............................. +40 C

Fan Status....................................... 3500 rpm

 

State of 802.11b Network......................... Enabled

State of 802.11a Network......................... Enabled

Number of WLANs.................................. 2

Number of Active Clients......................... 0

 

OUI Classification Failure Count................. 0

 

Burned-in MAC Address............................

Maximum number of APs supported.................. 75

System Nas-Id....................................

WLC MIC Certificate Types........................ SHA1/SHA2

WLC Time:

Time............................................. Mon Jul 30 07:26:20 2018

 

Timezone delta................................... 0:0

Timezone location................................ (GMT -6:00) Central Time (US and Canada)

 

NTP Servers

    NTP Version..................................     3

    NTP Polling Interval.........................     600

 

     Index     NTP Key Index                  NTP Server                Status          NTP Msg Auth Status

 

AP:

Manufacturer's Name.............................. Cisco Systems Inc.

Product Name..................................... Cisco Controller

Product Version.................................. 8.4.100.0

 

System Name...................................... ACCT_HAll

System Location..................................

System Contact...................................

System ObjectID.................................. 1.3.6.1.4.1.9.1.2370

IP Address....................................... 10.0.80.6

Last Reset....................................... 1: reload command

 

System Up Time................................... 0 days 1 hrs 7 mins 52 secs

System Timezone Location......................... (GMT -6:00) Central Time (US and Canada)

System Stats Realtime Interval................... 5

System Stats Normal Interval..................... 180

 

Configured Country............................... US  - United States

 

State of 802.11b Network......................... Enabled

State of 802.11a Network......................... Enabled

Number of WLANs.................................. 1

 

--More-- or (q)uit

Number of Active Clients......................... 1

 

OUI Classification Failure Count................. 0

 

Burned-in MAC Address............................ 

Maximum number of APs supported.................. 100

System Nas-Id....................................

WLC MIC Certificate Types........................ SHA1/SHA2

 

The reason why the AP won't join the controller is because the AP is loaded with Mobility Express image. Mobility Express turns an AP into a mini-WLC.

Read this:  Converting an AP from Mobility Express to CAPWAP Type

Dully noted. 

 

I will be at this location tomorrow to give it shot and update the thread.

Hi Ronald,

 

The AP is loaded with mobility express image not the capwap image, please do change the AP type to capwap.

 

 

  • Connect to the Console Port, Telnet or SSH to the AP.

     

  • Login to the Mobility Express controller console.

     

  • In the Mobility Express controller console, use the command apciscoshell to connect to the AP console.

     

  • Login to the AP console using the username Cisco and password Cisco. Both are case-sensitive.

     

  • Enter enable.

     

  • Enter the command ap-type capwap, and confirm .

Regards

Salma

 

It Worked!!!  Thanks Leo Laohoo and Salma!  Thats almost two weeks of trying everything I could think of!!!

 

Review Cisco Networking for a $25 gift card