05-23-2017 05:12 AM - edited 07-05-2021 07:05 AM
I've got a virtual WLC with numerous remote aps connected to it. I'm trying to connect one locally but its not joining ive had this problem before and somehow got one to join locally but want to get to the bottonm of this, see below for the ap startup process;
Writing reload timestamp (Tue May 23 11:58:19 UTC 2017) to disk
[05/23/2017 11:58:20.8519] UBIFS: un-mount UBI device 0, volume 3
The system is going down NOW!
[*05[*05/23/2017 11:58:20.9619] device capwap0 left promiscuous mode
[*05/23/2017 11:58:20.9819] device capwap1 left promiscuous mode
Sent SIGKILL to all processes
Requesting system reboot16]
[05/23/2017 11:58:22.9513] Restarting system.
[05/23/2017 11:58:22.9912] Going down for restart now
U-Boot 2012.07 (btldr release 25) (Aug 19 2016 - 13:54:18)
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
DRAM: 1 GiB
NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[1:0], write_counter=3
PCI0 Link Intialized
PCI1 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3af POE or Others detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part1
Booting from part1
Read 1024 bytes from volume part1 to 45000000
Read 19416728 bytes from volume part1 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment
Starting image ...
[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=30M@1280M console=ttyHSL1,9600n8 activepart=part1 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:10.8667] msm_serial_hs: probe of msm_serial_hs.0 failed with error -2
[01/01/1970 00:00:11.5265] buginf tty flushing thread started, ttyport=ef3f5290
[01/01/1970 00:00:16.2151] msm_hsusb_host msm_hsusb_host: unable to find transceiver
[01/01/1970 00:00:16.3450] watchdog: only one watchdog can use /dev/watchdog
[01/01/1970 00:00:16.4150] watchdog: error registering /dev/watchdog (err=-16)
[*01/01/1970 00:00:16.5950] buginf() enabled.
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
[*01/01/1970 00:00:16.6049] Made it into bootsh: Dec 5 2016 18:51:09
[*01/01/1970 00:00:16.6049] bootsh build T-b437e13e36d7f9e45776ba1dd26ebfdf25d90348-gb437e13e-kalairam
init started: BusyBox v1.20.2 (2016-12-05 18:25:28 PST)
User Access Verification
Username: [*01/01/1970 00:00:19.8339] Active version: 8.2.141.0
[*01/01/1970 00:00:19.8339] Backup version: 0.0.0.0
[*01/01/1970 00:00:20.0039] AP1852I
[*01/01/1970 00:00:20.0839] nss_driver - Turbo Support 1
[*01/01/1970 00:00:20.0839] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*01/01/1970 00:00:20.1938]
[*01/01/1970 00:00:20.1938] phy_value=0: org="0x1000" phy_reg="0x1800"
[*01/01/1970 00:00:20.5237] Current value of FACTORY_RESET=0
[*01/01/1970 00:00:20.5337] Last reload time: May 23 11:58:19 2017
[*05/23/2017 11:58:19.0000] Setting system time Tue May 23 11:58:19 UTC 2017
[*05/23/2017 11:58:19.0799] device wired0 entered promiscuous mode
[*05/23/2017 11:58:19.1799] device wired1 entered promiscuous mode
[*05/23/2017 11:58:19.5598] stile_lm_ft_corsica: module license [05/23/2017 11:58:19.5898] stile module dp init successfully
'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[05/23/2017 11:58:19.6898] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR VERSION:module build date: Nov 4 2015 at 14:26:22
[*05/23/2017 11:58:19.5798] stile_lm_dp_corsica: module license 'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[*05/23/2017 11:58:20.2796]
[*05/23/2017 11:58:20.2896] boot 122 build T-b437e13e36d7f9e45776ba1dd26ebfdf25d90348-gb437e13e-kalairam board corsica mac 00:38:DF:20:1E:60
[*05/23/2017 11:58:20.2896] Module: aptrace .text=0xbf000000 data=0xbf0069c0 bss=0xbf006cf8
[*05/23/2017 11:58:20.2896] Module: qca_nss_gmac .text=0xbf00f000 data=0xbf015af8 bss=0xbf015fb8
[*05/23/2017 11:58:20.2896] Module: qca_nss_drv .text=0xbf01f000 data=0xbf0367b0 bss=0xbf037560
[*05/23/2017 11:58:20.2896] Module: qca_nss_capwapmgr .text=0xbf053000 data=0xbf056b6c bss=0xbf056cc0
[*05/23/2017 11:58:20.2896] Module: nssmgrctl .text=0xbf05c000 data=0xbf05d728 bss=0xbf05da4c
[*05/23/2017 11:58:20.2896] Module: proclikefs .text=0xbf063000 data= bss=0xbf063b40
[*05/23/2017 11:58:20.2896] Module: stile_lm_ft .text= data= bss=
[*05/23/2017 11:58:20.2896] Module: stile_lm_dp .text= data= bss=
[*05/23/2017 11:58:20.2896] Module: qca_nss_profile_drv .text=0xbf8ce000 data=0xbf8cf324 bss=0xbf8cf498
[*05/23/2017 11:58:20.6295] Last reload reason : 2: Factory Reset
[*05/23/2017 11:58:21.8491] adf: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8491] asf: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8591] ath_hal: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8591] ath_dfs: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8691] ath_rate_atheros: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8791] ath_dev: module license 'Proprietary' taints kernel.
[*05/23/2017 11:58:21.8991]
[*05/23/2017 11:58:21.8991] __ol_ath_attach() Allocated scn c3b00480
[*05/23/2017 11:58:21.9191] Chip id: 0x9, chip version: 0x1000000
[*05/23/2017 11:58:21.9191]
[*05/23/2017 11:58:21.9191] Target Version is 1000000
[*05/23/2017 11:58:21.9191]
[*05/23/2017 11:58:21.9191] Flash Download Address c0000
[*05/23/2017 11:58:21.9191] ol_transfer_bin_file: flash data file defined
[*05/23/2017 11:58:21.9191] Cal location [0]: 00000000
[*05/23/2017 11:58:21.9191]
[*05/23/2017 11:58:21.9191] Wifi0 NAND FLASH Select OFFSET 0x1000
[*05/23/2017 11:58:21.9391] qc98xx_verify_checksum: flash checksum passed: 0x2679
[*05/23/2017 11:58:21.9391] ol_transfer_bin_file 4017: Download Flash data len 12064
[*05/23/2017 11:58:21.9591]
[*05/23/2017 11:58:21.9591] Board data initialized
[*05/23/2017 11:58:21.9991] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660
[*05/23/2017 11:58:21.9991] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*05/23/2017 11:58:21.9991] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin
[*05/23/2017 11:58:22.0690]
[*05/23/2017 11:58:22.0690] [Flash] : Ignore Module param
[*05/23/2017 11:58:22.0790] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*05/23/2017 11:58:22.0990] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*05/23/2017 11:58:23.1987] Startup Mode-0 set
[*05/23/2017 11:58:23.1987] HTC Service:0x0300 ep:1 TX flow control disabled
[*05/23/2017 11:58:23.2087] HTC Service:0x0100 ep:2 TX flow control disabled
[*05/23/2017 11:58:23.2087] Firmware_Build_Number:84
[*05/23/2017 11:58:23.2087] host/RAM_fw Build Ver Mismatch: H:0x47, F:0x54 !
[*05/23/2017 11:58:23.2087] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffea
[*05/23/2017 11:58:23.2087]
[*05/23/2017 11:58:23.2087] RES CFG Support wmi_service_bitmap 9778
[*05/23/2017 11:58:23.2087]
[*05/23/2017 11:58:23.2087] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 10 to TGT
[*05/23/2017 11:58:23.2087] Mesh Supported
[*05/23/2017 11:58:23.2787] wmi_ready_event_rx: WMI UNIFIED READY event
[*05/23/2017 11:58:23.2887] ACS not enabled
[*05/23/2017 11:58:23.2887] ol_ath_thermal_mitigation_attach: --
[*05/23/2017 11:58:23.2887]
[*05/23/2017 11:58:23.2887] __ol_ath_attach() Allocated scn ee500480
[*05/23/2017 11:58:23.3087] Chip id: 0x9, chip version: 0x1000000
[*05/23/2017 11:58:23.3087]
[*05/23/2017 11:58:23.3087] Target Version is 1000000
[*05/23/2017 11:58:23.3087]
[*05/23/2017 11:58:23.3087] Flash Download Address c0000
[*05/23/2017 11:58:23.3087] ol_transfer_bin_file: flash data file defined
[*05/23/2017 11:58:23.3087] Cal location [1]: 00004000
[*05/23/2017 11:58:23.3087]
[*05/23/2017 11:58:23.3087] wifi1 NAND FLASH Select OFFSET 0x5000
[*05/23/2017 11:58:23.3286] qc98xx_verify_checksum: flash checksum passed: 0x3733
[*05/23/2017 11:58:23.3286] ol_transfer_bin_file 4017: Download Flash data len 12064
[*05/23/2017 11:58:23.3486]
[*05/23/2017 11:58:23.3486] Board data initialized
[*05/23/2017 11:58:23.3886] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return param 4660
[*05/23/2017 11:58:23.3886] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*05/23/2017 11:58:23.3886] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_5G_v2_007.bin
[*05/23/2017 11:58:23.4586]
[*05/23/2017 11:58:23.4586] [Flash] : Ignore Module param
[*05/23/2017 11:58:23.4786] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*05/23/2017 11:58:23.4886] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*05/23/2017 11:58:24.1984] FWLOG: [25209] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:24.1984] FWLOG: [25209] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:24.1984] FWLOG: [25209] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:24.1984] FWLOG: [25209] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:24.5883] Startup Mode-0 set
[*05/23/2017 11:58:24.5883] HTC Service:0x0300 ep:1 TX flow control disabled
[*05/23/2017 11:58:24.5883] HTC Service:0x0100 ep:2 TX flow control disabled
[*05/23/2017 11:58:24.5982] Firmware_Build_Number:84
[*05/23/2017 11:58:24.5982] host/RAM_fw Build Ver Mismatch: H:0x47, F:0x54 !
[*05/23/2017 11:58:24.5982] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x0000ffea
[*05/23/2017 11:58:24.5982]
[*05/23/2017 11:58:24.5982] RES CFG Support wmi_service_bitmap 9778
[*05/23/2017 11:58:24.5982]
[*05/23/2017 11:58:24.5982] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 10 to TGT
[*05/23/2017 11:58:24.5982] Mesh Supported
[*05/23/2017 11:58:24.6682] wmi_ready_event_rx: WMI UNIFIED READY event
[*05/23/2017 11:58:24.6682] acfg_attach: Offload using existing sock eed9e200
[*05/23/2017 11:58:24.6682] ACS not enabled
[*05/23/2017 11:58:24.6682] ol_ath_thermal_mitigation_attach: --
[*05/23/2017 11:58:24.6782] ath_pktlog: module license 'unspecified' taints kernel.
[*05/23/2017 11:58:24.6882] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*05/23/2017 11:58:24.6882] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*05/23/2017 11:58:25.5879] FWLOG: [26584] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:25.5879] FWLOG: [26584] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:25.5879] FWLOG: [26584] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:25.5879] FWLOG: [26584] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*05/23/2017 11:58:26.1678] click-config/io-real.click:73: While configuring 'todev_nsscapwap0 :: ToDevice':
[*05/23/2017 11:58:26.1678] warning: device 'nsscapwap0' is down
[*05/23/2017 11:58:26.1878] click-config/io-real.click:73: While configuring 'fromdev_nsscapwap0 :: FromDevice':
[*05/23/2017 11:58:26.1878] warning: device 'nsscapwap0' is down
[*05/23/2017 11:58:26.7976] pid 1427's current affinity mask: 3
[*05/23/2017 11:58:26.7976] pid 1427's new affinity mask: 1
[*05/23/2017 11:58:27.2774] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*05/23/2017 11:58:27.2774] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*05/23/2017 11:58:33.4855] wired0: 100 Mbps Full Duplex
[*05/23/2017 11:58:33.4855]
[*05/23/2017 11:58:37.5342] ethernet_port wired0, ip 192.168.150.137, netmask 255.255.255.0, gw 192.168.150.254, mtu 1500, bcast 192.168.150.255, dns1 192.168.150.4, domain rasoft.co.ukLoading sha2...
[*05/23/2017 11:58:42.9425] Dumpping sha1...
[*05/23/2017 11:58:44.1221] Loading MIC cert and key
[*05/23/2017 11:58:44.1221] Dumpping sha2...
[*05/23/2017 11:58:45.3218] Loading MIC cert and key
[*05/23/2017 11:58:45.3218] /etc/init.d/S80cisco: line 158: /usr/bin/show_skun.lua: not found
[*05/23/2017 11:58:45.3618] Generating key, this may take a while...
[*05/23/2017 11:58:48.7707] Public key portion is:
[*05/23/2017 11:58:48.7707] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtwXm7G0lvveRonszfM07Eg2UOcU5aEO2Oy/YyIouPeQTkYFBncZ0YtwFTz6gGROSGgtZrNQmYf8KmnEEKdMr3EpbSJcx+yW3PGNtxH/6hQ2f5phBBo2Du1PJWUz4KIOfx1BFNnICOPhLDoNkmvP/QFdC2oOKZq+oiVu3QILuQKBErkGxs2djXP11w2QTgc3Q95Zgwl8HXmSFCtWBYWR4PNstXJBuem/JWpmZFvYfSWTnkzJt8lNp05qcNeSApb3YYBRmMgQCyLfO34P+A3h6TxsmqiQ6oA0qi+f5ZVa5OCS+tyS9XU5FK82ujeQ4zyEmxdp9L3T956YJycs1PifsT root@m0038DF201E60
[*05/23/2017 11:58:48.7707] Fingerprint: md5 86:8f:f6:bf:01:d6:b8:ab:da:44:4b:eb:ba:b6:b3:8f
[*05/23/2017 11:58:48.8207] pid 2691's current affinity mask: 3
[*05/23/2017 11:58:48.8207] pid 2691's new affinity mask: 1
[*05/23/2017 11:58:48.9506] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/1/g' -e 's/__DOMAIN_5G__/12/g' -e 's/__PRODUCT_ID__/AIR-AP1852I-E-K9/g' -e 's/__AP_TYPE__/48/g' -e 's/__WIRELESS_MAC__/00:38:DF:20:DF:E0/g' -e 's/__WIRED_MAC__/00:38:DF:20:1E:60/g' -e 's/__WIRED1_MAC__/00:38:DF:20:1E:60/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*05/23/2017 11:58:49.2905] Password for 'Cisco' changed
[*05/23/2017 11:58:50.2902] DOT11_DRV[0]: Init Radio0
[*05/23/2017 11:58:50.3002] DOT11_DRV[0]: Stop Radio0
[*05/23/2017 11:58:50.3102] DOT11_DRV[0]: set_channel Channel set to 6
[*05/23/2017 11:58:50.3102] DOT11_DRV[1]: Init Radio1
[*05/23/2017 11:58:50.3202] DOT11_DRV[1]: Stop Radio1
[*05/23/2017 11:58:50.3302] DOT11_DRV[1]: set_channel Channel set to 36
[*05/23/2017 11:58:50.3602] DOT11_DRV[0]: set_channel Channel set to 1
[*05/23/2017 11:58:50.3602] DOT11_DRV[0]: Channel set to 1, width 20
[*05/23/2017 11:58:50.3702] DOT11_DRV[0]: Channel set to 1, width 20
[*05/23/2017 11:58:50.3802] DOT11_DRV[1]: set_channel Channel set to 36
[*05/23/2017 11:58:50.3802] DOT11_DRV[1]: Channel set to 36, width 20
[*05/23/2017 11:58:50.3902] DOT11_DRV[1]: Channel set to 36, width 20
[*05/23/2017 11:58:50.3902] WTP IP Address = 192.168.150.137
[*05/23/2017 11:58:50.4202] DOT11_DRV[0]: Channel set to 1, width 20
[*05/23/2017 11:58:50.4202] DOT11_DRV[0]: Channel set to 1, width 20
[*05/23/2017 11:58:50.4202] DOT11_DRV[1]: Channel set to 36, width 20
[*05/23/2017 11:58:50.4302] DOT11_DRV[1]: Channel set to 36, width 20
[*05/23/2017 11:58:50.4302] CAPWAP State: Discovery
[*05/23/2017 11:58:50.5101] Discovery Request sent to 255.255.255.255 with discovery type set to CAPWAP_DISCOVERY_TYPE_UNKNOWN(0)
[*05/23/2017 11:58:50.5101] CAPWAP State: Init
[*05/23/2017 11:58:50.5101] CAPWAP State: Discovery
[*05/23/2017 11:58:51.5598] device capwap0 entered promiscuous mode
[*05/23/2017 11:58:51.5998] device capwap1 entered promiscuous mode
[*05/23/2017 11:58:59.9072] CAPWAP State: Discovery
[*05/23/2017 11:58:59.9172] Discovery Request sent to 255.255.255.255 with discovery type set to CAPWAP_DISCOVERY_TYPE_UNKNOWN(0)
[*05/23/2017 11:58:59.9172] Discovery Response from 192.168.150.23
[*05/23/2017 12:00:06.0000] CAPWAP State: DTLS Setup
show sysinfo from controller;
Manufacturer's Name.............................. Cisco Systems Inc.
Product Name..................................... Cisco Controller
Product Version.................................. 8.3.102.0
RTOS Version..................................... 8.3.102.0
Bootloader Version............................... 8.3.15.96
Emergency Image Version.......................... 8.3.102.0
OUI File Update Time............................. Sun Sep 07 10:44:07 IST 2014
Build Type....................................... DATA + WPS
System Name...................................... CiscoWLC
System Location..................................
System Contact...................................
System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
IP Address....................................... 192.168.150.23
IPv6 Address..................................... ::
System Up Time................................... 4 days 0 hrs 39 mins 49 secs
System Timezone Location......................... (GMT) London, Lisbon, Dublin, Edinburgh
System Stats Realtime Interval................... 5
System Stats Normal Interval..................... 180
--More-- or (q)uit
Configured Country............................... GB - United Kingdom
State of 802.11b Network......................... Enabled
State of 802.11a Network......................... Enabled
Number of WLANs.................................. 12
Number of Active Clients......................... 74
OUI Classification Failure Count................. 0
Burned-in MAC Address............................ 00:0C:29:9A:40:4B
Maximum number of APs supported.................. 3000
System Nas-Id....................................
WLC MIC Certificate Types........................ SHA1
Licensing Type................................... RTU
vWLC config...................................... Large
05-23-2017 05:23 AM
Hi Crag,
Info: 1850 wasn't supported until 8.2, but with 8.3 ..its supported.
you might be facing a bug:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd76589/?referring_site=bugquickviewredir
or
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd76580/?referring_site=bugquickviewredir
Workaround:
The 1830 and 1850 AP will not join the vWLC on code 8.3.X when the AP has a lower software image on it.
The only way these Aps join a virtual controller on 8.3.112.0 is by doing an image upgrade on the AP to 15.3(3)JD4 which is the equivalent to the 8.3.112.0 vWLC code.
Regards
Dont forget to rate helpful posts
05-23-2017 06:24 AM
thank you for your help Sandeep, how would i upgrade the firmware on the ap once i downloaded it, ie command line instructions.
05-23-2017 05:27 AM
2nd Method: which you can try:
Step1 : Run AP1852 as ME WLC,
Step2: Then I translated it into CAPWAP. This method might fixed connection problem.
Regards
Dont forget to rate helpful posts
05-23-2017 07:38 AM
I can ping the ap from the controller and in the ap join statistics it says 'not joined' 'Received Discovery request and sent response'
05-23-2017 07:52 AM
Craig,
Ping just shows that you have connectivity and doesn't mean that the AP "will" join. Have you tried the methods Sandeep provided? Seems like the issue is with the current firmware on the AP itself. I know there are other post with the same issue in which you might want to search and reference. I would load the latest image from here or the image Sandeep mentioned.
https://software.cisco.com/download/release.html?mdfid=286285803&flowid=75343&softwareid=286288051&release=15.3.3-JE&relind=AVAILABLE&rellifecycle=ED&reltype=latest
-Scott
*** Please rate helpful posts ***
05-23-2017 07:55 AM
I have downloaded the image just unsure on how to apply it to the ap
05-23-2017 05:09 PM
Console into the AP and use the command "archive download-sw /reload tftp://<TFTP IP address>/<IOS_filename>.tar".
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide