cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
613
Views
0
Helpful
1
Replies

vWLC 8.10.130.0 AIR-AP2802I-E-K9 not joining Secondary vWLC

jpleppanen
Level 1
Level 1

Hi

 

I've a problem. I've two vWLCs running active-active so AP redundancy is in use (High Availability setup).

 

APs are joining to Primary but if I try to move an AP to Secondary but it's not joining.
Time - clocks are in Sync ( 3-4 sec deviation) and NTP is configure, both Wirelss and AP group. Same NTP server.
VErsion are same
both have same Licenses 15 ap_count, (adder)

Firewall rules are equal.

Below is part of Debug (capwap events, pm pki)

 

*spamApTask1: Mar 11 22:14:36.396: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:14:36.767: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:14:36.768: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:14:36.768: 00:09:0f:09:1f:0b DTLS connection 0x9f53e233b8 established
*spamApTask1: Mar 11 22:14:36.768: CAPWAP DTLS session established msg

*spamApTask1: Mar 11 22:14:36.768: 00:09:0f:09:1f:0b DTLS Session established server (10.118.36.67:5246), client (10.118.245.20:5272)
*spamApTask1: Mar 11 22:14:36.768: 00:09:0f:09:1f:0b Starting wait join timer for AP: 10.118.245.20:5272

*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b DTLS connection 0x9f53e233b8 closed by controller
*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b DTLS connection was closed
*spamApTask1: Mar 11 22:14:36.866: CAPWAP DTLS connection closed msg

*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b DTLS connection closed event receivedserver (10.118.36.67/5246) client (10.118.245.20/5272)
*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b No entry exists for AP (10.118.245.20/5272)
*spamApTask1: Mar 11 22:14:36.866: 00:09:0f:09:1f:0b Deleting AP entry 10.118.245.20:5272 from temporary database.
*sshpmLscTask: Mar 11 22:15:35.162: sshpmLscTask: LSC Task received a message 4
*spamApTask1: Mar 11 22:16:40.833: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Msg Type = 19 Capwap state = 0

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Primary Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 Primary Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:40.833: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:16:56.763: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 Msg Type = 1 Capwap state = 0

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:16:56.763: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20 port 5272

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.764: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:16:56.790: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Msg Type = 1 Capwap state = 0

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20 port 5272

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:16:56.790: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:17:06.318: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.318: 00:09:0f:09:1f:0b DTLS connection not found, creating new connection for 10.118.245.20 (5272) 10.118.36.67 (5246)

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: called to evaluate <cscoSha2IdCert>

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: failed to find matching cert name cscoSha2IdCert

*spamApTask1: Mar 11 22:17:06.318: GetIDCert: Using SHA2 Id cert on WLC

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: Found matching ID cert cscoDefaultIdCert in row 2
*spamApTask1: Mar 11 22:17:06.318: Get Cert from CID: For CID 13f49d05 certType 1
*spamApTask1: Mar 11 22:17:06.318: Get Cert from CID: Found match of ID Cert in row 2
*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: called to evaluate <cscoSha2IdCert>

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: failed to find matching cert name cscoSha2IdCert

*spamApTask1: Mar 11 22:17:06.318: GetDERIDKey: Using SHA2 Id cert Private Keys on WLC

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask1: Mar 11 22:17:06.318: sshpmGetCID: Found matching ID cert cscoDefaultIdCert in row 2
*spamApTask1: Mar 11 22:17:06.318: GetPrivateKey: called to get key for CID 13f49d05


*spamApTask1: Mar 11 22:17:06.318: Private Key found row 2 KeyBufLen 4096 Keylen 1192 PrivateKeyPtr 0x7f02303bd978

*spamApTask1: Mar 11 22:17:06.338: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.373: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.373: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: locking ca cert table

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: x509 subject_name /serialNumber=PID:AP2800 SN:FOC23240DL1/O=Cisco/OU=ACT-2 Lite SUDI/CN=AP2800

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=ACT2 SUDI CA

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: CN AP2800

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: issuerCertCN ACT2 SUDI CA

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: Cert Name in subject is AP2800

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.

*spamApTask1: Mar 11 22:17:06.373: NMSP:: Algo name matched SHA256

*spamApTask1: Mar 11 22:17:06.373: ACT2 RSA SHA1 certificate

*spamApTask1: Mar 11 22:17:06.373: ACT2 dummy mac: MAC: 1122.3344.5566

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.

*spamApTask1: Mar 11 22:17:06.373: Retrieving x509 cert for CertName cscoAct2RsaCaCert

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: called to evaluate <cscoAct2RsaCaCert>

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: Found matching CA cert cscoAct2RsaCaCert in row 8
*spamApTask1: Mar 11 22:17:06.373: Found CID 20ead079 for certname cscoAct2RsaCaCert

*spamApTask1: Mar 11 22:17:06.373: CACertTable: Found matching CID cscoAct2RsaCaCert in row 8 x509 0x7f0233d91bd8
*spamApTask1: Mar 11 22:17:06.373: Retrieving x509 cert for CertName cscoDefaultNewRootCaCert

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: called to evaluate <cscoDefaultNewRootCaCert>

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: Found matching CA cert cscoDefaultNewRootCaCert in row 4
*spamApTask1: Mar 11 22:17:06.373: Found CID 204debc1 for certname cscoDefaultNewRootCaCert

*spamApTask1: Mar 11 22:17:06.373: CACertTable: Found matching CID cscoDefaultNewRootCaCert in row 4 x509 0x7f0233d93e38
*spamApTask1: Mar 11 22:17:06.373: cscoAct2RsaCaCert: successfully added ACT2 RSA to store cert Verify User Certificate(?!)

*spamApTask1: Mar 11 22:17:06.373: Verify User Certificate: X509 Cert Verification return code: 1
*spamApTask1: Mar 11 22:17:06.373: Verify User Certificate: X509 Cert Verification result text: ok
*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: called to evaluate <cscoAct2RsaCaCert>

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: Found matching CA cert cscoAct2RsaCaCert in row 8
*spamApTask1: Mar 11 22:17:06.373: Verify User Certificate: OPENSSL X509_Verify: AP Cert Verfied Using >cscoAct2RsaCaCert<

*spamApTask1: Mar 11 22:17:06.373: OpenSSL Get Issuer Handles: Check cert validity times (allow expired NO)
*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask1: Mar 11 22:17:06.373: sshpmGetCID: Found matching ID cert cscoDefaultIdCert in row 2
*spamApTask1: Mar 11 22:17:06.373: sshpmFreePublicKeyHandle: called with 0x7f022b4b7ba8

*spamApTask1: Mar 11 22:17:06.373: sshpmFreePublicKeyHandle: freeing public key

*spamApTask1: Mar 11 22:17:06.374: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.751: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.751: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.751: 00:09:0f:09:1f:0b DTLS connection 0x9f53e23620 established
*spamApTask1: Mar 11 22:17:06.751: CAPWAP DTLS session established msg

*spamApTask1: Mar 11 22:17:06.752: 00:09:0f:09:1f:0b DTLS Session established server (10.118.36.67:5246), client (10.118.245.20:5272)
*spamApTask1: Mar 11 22:17:06.752: 00:09:0f:09:1f:0b Starting wait join timer for AP: 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b DTLS connection 0x9f53e23620 closed by controller
*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b DTLS connection was closed
*spamApTask1: Mar 11 22:17:06.848: CAPWAP DTLS connection closed msg

*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b DTLS connection closed event receivedserver (10.118.36.67/5246) client (10.118.245.20/5272)
*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b No entry exists for AP (10.118.245.20/5272)
*spamApTask1: Mar 11 22:17:06.848: 00:09:0f:09:1f:0b Deleting AP entry 10.118.245.20:5272 from temporary database.
*sshpmLscTask: Mar 11 22:17:37.562: sshpmLscTask: LSC Task received a message 4
*spamApTask1: Mar 11 22:19:10.802: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Msg Type = 19 Capwap state = 0

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Primary Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 Primary Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:10.802: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:19:26.731: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Msg Type = 1 Capwap state = 0

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20 port 5272

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.731: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:19:26.777: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 packet received of length 289 from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Msg Type = 1 Capwap state = 0

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery Request from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 20

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 73 msgEleType = 38

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 ApModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 40 msgEleType = 39

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 41

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 1 msgEleType = 44

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 17 msgEleType = 45

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 36 msgEleType = 28

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 5 msgEleType = 1048

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 10 msgEleType = 37

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 msgEleLength = 23 msgEleType = 37

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Vendor specific payload from AP 68:3B:78:D0:D7:80 validated

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, MaxLicense=15 joined Aps =0
*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 1. 0 0

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 2. 112 23

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 3. 0 0

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 4. 15 0

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 apType = 56 apModel: AIR-AP2802I-E-K9

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 apType: Ox38 bundleApImageVer:
*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 acName = wlc-2
*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp:AC Name message element length = 58

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: Mwar type payload len = 88

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: Time sync payload len = 117

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery resp: Expire MIC TLV payload len = 136

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20 port 5272

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 Discovery Response sent to 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:26.777: 68:3b:78:d0:d7:80 WTP already released
*spamApTask1: Mar 11 22:19:36.269: 00:09:0f:09:1f:0b CAPWAP Control Msg Received from 10.118.245.20:5272

*spamApTask1: Mar 11 22:19:36.269: 00:09:0f:09:1f:0b DTLS connection not found, creating new connection for 10.118.245.20 (5272) 10.118.36.67 (5246)

 

What might cause this?

*spamReceiveTask: Mar 10 18:58:51.990: Received SPAM_UPDATE_NEXT_HOP_MAC

 

br

juha-pekka

1 Reply 1

Any way to get output from AP ends to see what msg AP gives for the reason of failure.

 

If you have a test AP then pls try to register it to this WLC and see.

 

HTH

Rasika

Review Cisco Networking for a $25 gift card