03-07-2013 11:28 PM - edited 07-03-2021 11:41 PM
Hello all,
Below are the errors that i am getting while trying to register AP (2606e) with vWLC (7.3.112) .
That is the error on vwlc
*spamApTask6: Mar 08 18:07:24.594: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:06:09.178: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:05:04.179: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:03:48.763: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:02:43.759: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:01:27.378: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 18:00:22.403: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 17:59:06.962: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 17:58:01.955: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*emWeb: Mar 08 17:58:00.080: #WEB-3-FORM_SUBMIT_FAILED: ap_join_stats.c:475 Form submission failed for file:ap_join_stats_list.html.
*spamApTask6: Mar 08 17:56:46.540: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229
*spamApTask6: Mar 08 17:55:41.534: #DTLS-3-HANDSHAKE_FAILURE:
Beow error from AP 2602e
(note:we are assignig static ip to ap after assigning this static ip are getting following error)
*May 31 00:07:20.047: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
*May 31 00:07:20.047: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255lwapp_crypto_init: MIC Present and Parsed Successfully
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
*May 31 00:07:46.063: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
AP442b.039a.8b77>
AP442b.039a.8b77>
AP442b.039a.8b77>en
Password:
*May 31 00:07:57.063: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Mar 8 12:53:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246Peer certificate verification failed 000B
*Mar 8 12:53:12.015: %CAPWAP-3-ERRORLOG: Certificate verification failed!
*Mar 8 12:53:12.015: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:337 Certificate verified failed!
*Mar 8 12:53:12.015: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 10.129.150.223:5246
*Mar 8 12:53:12.015: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246
*Mar 8 12:53:12.015: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination.
Password:
But in wlc statistis we are able to see the ap join mac, screen shot is attached
03-08-2013 12:35 AM
please do the following:
monitor --> statisitics --> click the AP name in the output you will find an indicator why the AP is not able to join
the controller is arguing about the certificate.
Pleae have the following debug outputs collected from controller:
debug mac addr < ap mac addr >
debug capwap event enable
debug capwap error enable
debug pm pki enable
on the AP, please have the following :
debug capwap client event
debug capwap client error
from the controller please have the following outputs attched:
show msglog
show traplog
from the AP
show capwap client config
show capwap client rcb
--------------------------------------------------------------------
Please make sure to rate correct answers
03-08-2013 01:47 AM
Thanks maldehne, find the log message below.
(Cisco Controller) >
(Cisco Controller) >show msglog
Message Log Severity Level ...................... ERROR
*fp_main_task: Mar 08 20:24:27.162: #LOG-3-Q_IND: sisf_shim_utils.c:316 Internal error, NULL entry in sisf_sw_policy_get_cfg_ptr[...It occurred 3 times.!]
*fp_main_task: Mar 08 20:24:27.148: #SISF-3-INTERNAL: sisf_shim_utils.c:316 Internal error, NULL entry in sisf_sw_policy_get_cfg_ptr
*fp_main_task: Mar 08 20:24:27.147: #SISF-3-INTERNAL: sisf_shim_utils.c:316 Internal error, Can't create the acl for 0000019F
*fp_main_task: Mar 08 20:24:25.925: #MM-3-MEMBER_ADD_FAILED: mm_dir.c:1193 Could not add Mobility Member. Reason: IP already assigned, Member-Count:1,MAC: 00:00:00:00:00:00, IP: 0.0.0.0
*mfpKeyRefreshTask: Mar 08 20:24:21.957: #SSHPM-3-NOT_INIT: bsnrandom.c:620 Random context not initialized
(Cisco Controller) show>
(Cisco Controller) show>trap?
trapflags traplog
(Cisco Controller) show>traplog
Number of Traps Since Last Reset ............ 5
Number of Traps Since Log Last Displayed .... 0
Log System Time Trap
--- ------------------------ -------------------------------------------------
0 Fri Mar 8 20:25:31 2013 Controller time base status - Controller is out o
f sync with the central timebase.
1 Fri Mar 8 20:25:06 2013 Cold Start:
2 Fri Mar 8 20:24:30 2013 Link Up: Slot: 0 Port: 1 Admin Status: Enable Op
er Status: Link Up
3 Fri Mar 8 20:24:27 2013 A RF group member has been added on 802.11a netwo
rk on controller with IP 10.129.150.223(MAC 00:0
c:29:10:ed:c4)
4 Fri Mar 8 20:24:27 2013 A RF group member has been added on 802.11b/g net
work on controller with IP 10.129.150.223(MAC 00
:0c:29:10:ed:c4)
Would you like to display more entries? (y/n)
AP442b.039a.8b77#show capwap client rcb
AdminState : ADMIN_ENABLED
SwVer : 7.2.104.6
NumFilledSlots : 0
Name : AP442b.039a.8b77
Location : default location
MwarName : V_WLC
MwarApMgrIp : 10.129.150.223
MwarHwVer : 0.0.0.0
ApMode : Local
ApSubMode : Not Configured
OperationState :
CAPWAP Path MTU : 576
LinkAuditing : disabled
AP Rogue Detection Mode : Enabled
AP Tcp Mss Adjust : Disabled
Band Direct : Disabled
Predownload Status : None
Auto Immune Status : Disabled
RA Guard Status : Disabled
Efficient Upgrade State : Disabled
Efficient Upgrade Role : None
TFTP Server : Disabled
AP442b.039a.8b77#show cap
AP442b.039a.8b77#show capwap cli
AP442b.039a.8b77#show capwap client config
configMagicMark 0xF1E2D3C4
chkSumV2 31105
chkSumV1 26827
swVer 7.2.104.6
adminState ADMIN_ENABLED(1)
name AP442b.039a.8b77
location default location
group name
mwarName
mwarIPAddress 0.0.0.0
mwarName
mwarIPAddress 0.0.0.0
mwarName
mwarIPAddress 0.0.0.0
ssh status Disabled
Telnet status Disabled
numOfSlots 0
spamRebootOnAssert 1
spamStatTimer 180
randSeed 0xBAD0
transport SPAM_TRANSPORT_L3(2)
transportCfg SPAM_TRANSPORT_DEFAULT(0)
initialisation SPAM_PRODUCTION_DISCOVERY(1)
--More-- ApMode Local
ApSubMode Not Configured
AP Rogue Detection Mode Enabled
OfficeExtend AP [0] Disabled
OfficeExtend AP JoinMode[0] Standard
Discovery Timer 10 secs
Heart Beat Timer 30 secs
Led State Enabled 255
Primed Interval 0
AP ILP Pre-Standard Switch Support Disabled
AP Power Injector Disabled
Infrastructure MFP validation Enabled
non-occupancy channels:
Ethernet (Duplex/Speed) auto/auto
Slot 0
adminstate ADMIN_ENABLED(1)
radioType RADIO_TYPE_UNKNOWN
countryCode ^@^@^@
countryISOCode ^@^@^@
chanAutoCfg CONFIG_AUTO
channel 0
txPowerAutoCfg CONFIG_AUTO
--More-- txPowerLevel 0
diversitySelection DIVERSITY_ENABLED
Antenna Mode ANTENNA_OMNI
antennaSelection_0 INTERNAL_ANTENNA
antennaSelection_1 INTERNAL_ANTENNA
antennaSelection_2 INTERNAL_ANTENNA
antennaSelection_3 INTERNAL_ANTENNA
twiceExtAntennaGain 0
Profile Mode CONFIG_AUTO
Load Profile
rfBusyThreshold 0
numClientsThreshold 0
bytesPerSecThreshold 0
Interference Profile
InterferenceThreshold 0
Noise Profile
NoiseThreshold 0
Coverage Profile
SNRThreshold 0
ExceptionThreshold 0
minClientsThreshold 0
11gSupport Disabled
override mode Disabled
--More-- CCX RM Mode CONFIG_AUTO
CCX RM Config
rm state 0
rm meas interval 0
rts enabled 0
rts threshold 2347
LOMM optimization 0
LOMM Number of Channels 0
channel[0] = 0, channel[1] = 0, channel[2] = 0, channel[3] = 0,
FMC HS AP Type is 0, Threshhold 0
Slot 1
adminstate ADMIN_ENABLED(1)
radioType RADIO_TYPE_UNKNOWN
countryCode ^@^@^@
countryISOCode ^@^@^@
chanAutoCfg CONFIG_AUTO
channel 0
txPowerAutoCfg CONFIG_AUTO
txPowerLevel 0
diversitySelection DIVERSITY_ENABLED
Antenna Mode ANTENNA_OMNI
antennaSelection_0 INTERNAL_ANTENNA
antennaSelection_1 INTERNAL_ANTENNA
--More--
logging facility kern
^
% Invalid input detected at '^' marker.
antennaSelection_2 INTERNAL_ANTENNA
antennaSelection_3 INTERNAL_ANTENNA
twiceExtAntennaGain 0
Profile Mode CONFIG_AUTO
Load Profile
rfBusyThreshold 0
numClientsThreshold 0
bytesPerSecThreshold 0
Interference Profile
InterferenceThreshold 0
Noise Profile
NoiseThreshold 0
Coverage Profile
SNRThreshold 0
ExceptionThreshold 0
minClientsThreshold 0
11gSupport Disabled
override mode Disabled
CCX RM Mode CONFIG_AUTO
CCX RM Config
rm state 0
rm meas interval 0
rts enabled 0
Debug message from controller below.
(Cisco Controller) >*spamApTask3: Mar 08 20:29:49.249: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192
*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*sshpmLscTask: Mar 08 20:30:31.894: sshpmLscTask: LSC Task received a message 4
*spamApTask3: Mar 08 20:31:09.550: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192
*spamApTask3: Mar 08 20:31:09.550: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
*spamApTask3: Mar 08 20:31:09.551: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*spamApTask3: Mar 08 20:31:09.551: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*spamApTask3: Mar 08 20:32:28.940: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192
*spamApTask3: Mar 08 20:32:28.940: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
*spamApTask3: Mar 08 20:32:28.941: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*spamApTask3: Mar 08 20:32:28.941: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192
*sshpmLscTask: Mar 08 20:32:34.644: sshpmLscTask: LSC Task received a message 4
*spamApTask3: Mar 08 20:32:38.955: 44:2b:03:9a:8b:70 DTLS connection not found, creating new connection for 10:129:150:175 (43192) 10:129:150:223 (5246)
*spamApTask3: Mar 08 20:32:38.955: sshpmGetCID: called to evaluate
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.957: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: called to get cert for CID 17a666f7
*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
*spamApTask3: Mar 08 20:32:38.962: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.962: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.963: sshpmGetCID: called to evaluate
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: called to get key for CID 17a666f7
*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<
*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: match in row 2
Debug message from AP
P442b.039a.8b77#deb
AP442b.039a.8b77#debug cap
AP442b.039a.8b77#debug capwap cli
AP442b.039a.8b77#debug capwap client ev
AP442b.039a.8b77#debug capwap client event
CAPWAP Client EVENT display debugging is on
AP442b.039a.8b77#
logging facility kern
^
% Invalid input detected at '^' marker.
logging trap emergencies
^
% Invalid input detected at '^' marker.
logging facility kern
^
% Invalid input detected at '^' marker.
logging trap emergencies
^
% Invalid input detected at '^' marker.
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
*Mar 8 15:02:08.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Mar 8 15:02:08.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Mar 8 15:02:08.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246
*Mar 8 15:02:08.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Mar 8 15:02:08.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Mar 8 15:02:08.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
*Mar 8 15:02:08.999: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
*Mar 8 15:02:09.387: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
*Mar 8 15:02:09.387: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
AP442b.039a.8b77#de
AP442b.039a.8b77#deb
AP442b.039a.8b77#debug ca
AP442b.039a.8b77#debug ca
*Mar 8 15:02:18.387: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
*Mar 8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Request sent to 10.129.150.223 with discovery type set to 1
*Mar 8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Request sent to 255.255.255.255 with discovery type set to 0
*Mar 8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Response from 10.129.150.223cli
AP442b.039a.8b77#debug cacli p
AP442b.039a.8b77#debug capwap cli
AP442b.039a.8b77#debug capwap client err
AP442b.039a.8b77#debug capwap client error
CAPWAP Client ERROR display debugging is on
AP442b.039a.8b77#
*Mar 8 15:02:28.387: %CAPWAP-3-EVENTLOG: Selected MWAR 'V_WLC' (index 0).
*Mar 8 15:02:28.387: %CAPWAP-3-EVENTLOG: Ap mgr count=1
*Mar 8 15:02:28.387: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Mar 8 15:02:28.387: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 0xA8196DF , load = 0..
*Mar 8 15:02:28.387: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
*Mar 8 15:02:28.000: %CAPWAP-3-EVENTLOG: Setting time to 15:02:28 UTC Mar 8 2013
*Mar 8 15:02:28.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246
*Mar 8 15:02:28.000: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Setup.
*Mar 8 15:02:58.051: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2051 Max retransmission count reached!
logging facility kern
^
% Invalid input detected at '^' marker.
logging trap emergencies
^
% Invalid input detected at '^' marker.
logging facility kern
^
% Invalid input detected at '^' marker.
logging trap emergencies
^
% Invalid input detected at '^' marker.
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
*Mar 8 15:03:27.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Mar 8 15:03:27.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Mar 8 15:03:27.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246
*Mar 8 15:03:27.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Mar 8 15:03:27.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Mar 8 15:03:27.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
*Mar 8 15:03:27.999: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
*Mar 8 15:03:28.387: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
*Mar 8 15:03:28.387: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
*Mar 8 15:03:37.391: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
*Mar 8 15:03:37.391: %CAPWAP-3-EVENTLOG: Discovery Request sent to 10.129.150.223 with discovery type set to 1
*Mar 8 15:03:37.391: %CAPWAP-3-EVENTLOG: Discovery Request sent to 255.255.255.255 with discovery type set to 0
*Mar 8 15:03:37.395: %CAPWAP-3-EVENTLOG: Discovery Response from 10.129.150.223
*Mar 8 15:03:47.391: %CAPWAP-3-EVENTLOG: Selected MWAR 'V_WLC' (index 0).
*Mar 8 15:03:47.391: %CAPWAP-3-EVENTLOG: Ap mgr count=1
*Mar 8 15:03:47.391: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Mar 8 15:03:47.391: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 0xA8196DF , load = 0..
*Mar 8 15:03:47.391: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
*Mar 8 15:03:48.000: %CAPWAP-3-EVENTLOG: Setting time to 15:03:48 UTC Mar 8 2013
*Mar 8 15:03:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246
*Mar 8 15:03:48.000: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Setup.
03-08-2013 02:07 AM
seems that the debugs are not complete,
there should be more i guess.
simply the join is not proceeding but we should see more to identify what is going on.
In the mean time try to reload the controller.
How it goes ??
03-08-2013 02:10 AM
can i have show version output form the AP ?
From the controller :
monitor --> statisitics --> click the AP name in the output you will find an indicator why the AP is not able to join
03-08-2013 06:17 PM
Can you post the following output please?
1. vWLC: sh sysinfo;
2. AP: sh version
3. AP: sh inventory
03-08-2013 06:26 PM
This is strange because it could be the ap is refusing the cert of the controller because its self signed and not MSC installed. Cisco is suppose to send all new APs with 7.3 release firmware so they accept the SSC so do check the version on the AP because prior to 7.3 firmware the AP can't join a vwlc as they use a self signed cert. I have also seen this issue when a vwlc is put in and the admin forgets to accept the license agreement. This is important, you must actually view the license to accept it and then reboot the controller.
Sent from Cisco Technical Support iPhone App
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide