cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2343
Views
0
Helpful
4
Replies

WLC losing connectivity to AP's and clients

deyster94
Level 5
Level 5

I have a client that is running ver 7.5.120.0 on their controllers and they are having some odd issues, to say the least.  The controllers are supposed to be in a HA pair so that one fails, the other one takes completely over.  The second WLC only has the HA sku on it, so it cannot serve clients unless the primary goes down. 

At any rate, they requested that their guest wireless SSID have an underscore removed from it since it was causing issues with Apple devices connecting to it.  I created a new SSID without the underscore and disabled the one with the underscore.  This was late in the day, but by the time I got home, they said they could not connect to the new SSID I had created.  This was odd since all the settings were exactly the same.  I connected to the WLC remotely and checked the settings again, but nothing stood out.  However, one thing that stood out was that neither of the two AP's that were associated earlier in the day were no longer associated.  Now, the client's building is under construction, so I thought they may had been taken offline for the night.  This morning when I went to connect to the WLC, I couldn't.  I couldn't even initially ping it from the core switch and then it started to respond to ping requests enough that I could kind of connect.  Once again, it didn't show any AP's associated with the controller.  However, as the morning went on, one AP and then the other showed associated to the controller.  Then clients started connecting as well. 

The other issue they are having is that the secondary controller is showing connected via CDP, but the primary controller does not have communication with it.  So the redundancy is not working.  This isn't as big of an issue (yet), but will need resolved.  I am not seeing anything in the logs that is showing the controller has crashed, but maybe I need to turn up a debug. 

Has anyone run into a similar situation?  The bug search tool doesn't have anything listed for 7.5.120.0, so I don't know if I hit a major bug, or if this is a hardware issue.  I am, however, asking them to change out the patch cables since during the initial install of their DC we had some bad ones.  Layer 1 has bit me in the butt before.

TIA for any help/suggestions,

Dan

4 Replies 4

Sandeep Choudhary
VIP Alumni
VIP Alumni

Hi,

Please post debug output.

Regards

Everything is stable at the moment, so I am not sure what debugs would help.  I am open to suggestions.

-Dan

Then may be a software issue.

Just suggestion from my side: Never use the latest software because it may have some bugs.

Even 7.5 have some bugs.

post debug , if u face same problem again.

Regards

The problem occurred again this morning and I ran the following debugs on the controller:

debug mac addr

debug capwap event enable

debug capwap error enable

debug pm pki enable

Here is what I have so far:

debug capwap events enable

(Cisco Controller) >

(Cisco Controller) >debug capwap errors enable

(Cisco Controller) >

(Cisco Controller) >debug pm pki enable

(Cisco Controller) >*spamApTask6: Nov 15 09:17:26.401: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.401: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.402: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.412: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.412: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.413: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:26.413: 0c:68:03:b9:87:10 Setting MTU to 1005

*spamApTask6: Nov 15 09:17:26.414: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask0: Nov 15 09:17:26.509: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:26.509: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:26.510: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:26.510: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:26.514: 0c:68:03:d7:c0:20 Configuration Update Response from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:26.518: 0c:68:03:d7:c0:20 Configuration Update Response from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.509: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.510: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.510: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.510: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.511: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.511: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.512: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:36.512: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:39.033: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:17:39.033: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask6: Nov 15 09:17:39.369: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:39.369: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:39.370: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:39.370: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:42.084: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:42.085: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*sshpmLscTask: Nov 15 09:17:42.558: sshpmLscTask: LSC Task received a message 4

*spamApTask6: Nov 15 09:17:53.410: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:53.410: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:53.477: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:53.488: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:53.488: 0c:68:03:b9:87:10 Setting MTU to 1485

*spamApTask6: Nov 15 09:17:53.488: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:54.414: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:54.414: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*apfMsConnTask_1: Nov 15 09:17:55.953: sending spamAddMobile aclName =


*spamReceiveTask: Nov 15 09:17:55.953: 0c:68:03:b9:87:10 Successful transmission of LWAPP Add-Mobile to AP 0c:68:03:b9:87:10

*spamReceiveTask: Nov 15 09:17:55.954: 0c:68:03:b9:87:10 Setting ADD_MOBILE ack state for STA 24:77:03:9a:62:88 (idx 55), seqno 56 action 1

*spamApTask6: Nov 15 09:17:55.955: 0c:68:03:b9:87:10 Configuration Update Response from 10.191.9.204:28802


*Dot1x_NW_MsgTask_0: Nov 15 09:17:55.967: sending spamAddMobile aclName =


*spamReceiveTask: Nov 15 09:17:55.967: 0c:68:03:b9:87:10 Successful transmission of LWAPP Add-Mobile to AP 0c:68:03:b9:87:10

*spamApTask6: Nov 15 09:17:55.968: 0c:68:03:b9:87:10 Configuration Update Response from 10.191.9.204:28802


*spamApTask6: Nov 15 09:17:55.969: 0c:68:03:b9:87:10 Configuration Update Response from 10.191.9.204:28802


*spamApTask0: Nov 15 09:18:14.675: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.675: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.676: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.676: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.677: 0c:68:03:d7:c0:20 WTP Event Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.677: 0c:68:03:d7:c0:20 WTP Event Response sent to 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.678: 0c:68:03:d7:c0:20 Echo Request from 10.191.9.206:28194


*spamApTask0: Nov 15 09:18:14.678: 0c:68:03:d7:c0:20 Echo Response sent to 10.191.9.206:28194


(Cisco Controller) >debug mac addr 0c:68:03:b9:87:10

(Cisco Controller) >*spamApTask6: Nov 15 09:18:26.414: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:26.415: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:26.415: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:26.416: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:26.416: 0c:68:03:b9:87:10 Echo Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:26.416: 0c:68:03:b9:87:10 Echo Response sent to 10.191.9.204:28802


*spamReceiveTask: Nov 15 09:18:32.746: spamProcessGlobalPathMtuUpdate: Changing Global LRAD MTU to 1005


*spamApTask6: Nov 15 09:18:39.375: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:39.375: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:39.376: 0c:68:03:b9:87:10 WTP Event Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:18:39.376: 0c:68:03:b9:87:10 WTP Event Response sent to 10.191.9.204:28802


*apfMsConnTask_0: Nov 15 09:19:02.651: sending spamAddMobile aclName =


*spamReceiveTask: Nov 15 09:19:02.651: 0c:68:03:b9:87:10 Configuration update request for delete station sent to 10.191.9.204:28802


*Dot1x_NW_MsgTask_0: Nov 15 09:19:02.663: sending spamAddMobile aclName =


*apfMsConnTask_0: Nov 15 09:19:03.114: sending spamAddMobile aclName =


*spamReceiveTask: Nov 15 09:19:03.114: 0c:68:03:b9:87:10 Configuration update request for delete station sent to 10.191.9.204:28802


*Dot1x_NW_MsgTask_0: Nov 15 09:19:03.137: sending spamAddMobile aclName =


*spamReceiveTask: Nov 15 09:19:03.735: 0c:68:03:b9:87:10 Configuration update request for delete station sent to 10.191.9.204:28802


*apfMsConnTask_0: Nov 15 09:19:03.735: sending spamAddMobile aclName =


*Dot1x_NW_MsgTask_4: Nov 15 09:19:03.746: sending spamAddMobile aclName =


*spamApTask6: Nov 15 09:19:05.562: 0c:68:03:b9:87:10 Msg Timeout for 10.191.9.204:28802, max retries: 5


*spamApTask6: Nov 15 09:19:08.562: 0c:68:03:b9:87:10 Msg Timeout for 10.191.9.204:28802, max retries: 5


*apfMsConnTask_0: Nov 15 09:19:10.280: sending spamAddMobile aclName =


*spamApTask5: Nov 15 09:19:10.389: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28801


*spamApTask5: Nov 15 09:19:10.389: 0c:68:03:b9:87:10 apfSpamProcessStateChangeInSpamContext: Down LWAPP event for AP 0c:68:03:b9:87:10 slot 0

*apfReceiveTask: Nov 15 09:19:10.389: 0c:68:03:b9:87:10 Received LWAPP Down event for AP 0c:68:03:b9:87:10 slot 0!

*spamApTask5: Nov 15 09:19:10.390: 0c:68:03:b9:87:10 apfSpamProcessStateChangeInSpamContext: Down LWAPP event for AP 0c:68:03:b9:87:10 slot 1

*apfReceiveTask: Nov 15 09:19:10.390: 0c:68:03:b9:87:10 Received LWAPP Down event for AP 0c:68:03:b9:87:10 slot 1!

*spamApTask5: Nov 15 09:19:10.391: 0c:68:03:b9:87:10 Echo Timer Expiry: Missing Echo from AP0c:68:03:b9:87:10, Closing dtls Connection.

*spamApTask5: Nov 15 09:19:10.391: 0c:68:03:b9:87:10 Finding DTLS connection to delete for AP (10:191:9:204/28802)

*spamApTask5: Nov 15 09:19:10.391: 0c:68:03:b9:87:10 Disconnecting DTLS Capwap-Ctrl session 0x176cc7a0 for AP (10:191:9:204/28802)


*spamApTask5: Nov 15 09:19:10.391: 0c:68:03:b9:87:10 CAPWAP State: Dtls tear down


*spamApTask5: Nov 15 09:19:10.391: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28802) mwar:10.191.8.27(5246)


*spamApTask5: Nov 15 09:19:10.392: 0c:68:03:b9:87:10 DTLS keys for Control Plane deleted successfully for AP 10.191.9.204


*spamApTask6: Nov 15 09:19:10.392: 0c:68:03:b9:87:10 DTLS connection closed event receivedserver (10.191.8.27/5246) client (10.191.9.204/28802)

*spamApTask6: Nov 15 09:19:10.392: 0c:68:03:b9:87:10 Entry exists for AP (10.191.9.204/28802)

*spamApTask5: Nov 15 09:19:10.399: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28801


*spamApTask5: Nov 15 09:19:10.399: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28801


*spamApTask6: Nov 15 09:19:10.399: 0c:68:03:b9:87:10 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 0c:68:03:b9:87:10 slot 0

*spamApTask6: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 0c:68:03:b9:87:10 slot 1

*spamApTask5: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Invalid event Capwap_discovery_request & state Capwap_dtls_teardown combination


*apfReceiveTask: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Deregister LWAPP event for AP 0c:68:03:b9:87:10 slot 0

*spamApTask5: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 State machine handler: Failed to process  msg type = 1 state = 4 from 10.191.9.204:28801


*apfReceiveTask: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Deregister LWAPP event for AP 0c:68:03:b9:87:10 slot 1

*spamApTask5: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Failed to parse CAPWAP packet from 10.191.9.204:28801


*spamApTask5: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28801


*spamApTask5: Nov 15 09:19:10.400: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =2

*spamApTask5: Nov 15 09:19:10.401: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28801


*spamApTask5: Nov 15 09:19:10.401: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28801


*spamApTask6: Nov 15 09:19:10.401: 0c:68:03:b9:87:10 No AP entry exist in temporary database for 10.191.9.204:28802

*apfMsConnTask_0: Nov 15 09:19:14.423: sending spamAddMobile aclName =


*spamApTask5: Nov 15 09:19:20.388: 0c:68:03:b9:87:10 DTLS connection not found, creating new connection for 10:191:9:204 (28801) 10:191:8:27 (5246)


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.389: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.390: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask5: Nov 15 09:19:20.390: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.390: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.390: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask5: Nov 15 09:19:20.390: sshpmGetSshPrivateKeyFromCID: match in row 2


*apfMsConnTask_0: Nov 15 09:19:20.432: sending spamAddMobile aclName =


*spamApTask5: Nov 15 09:19:20.699: sshpmGetIssuerHandles: locking ca cert table

*spamApTask5: Nov 15 09:19:20.699: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask5: Nov 15 09:19:20.699: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask5: Nov 15 09:19:20.703: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa7080b, MAILTO=support@cisco.com

*spamApTask5: Nov 15 09:19:20.703: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask5: Nov 15 09:19:20.703: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a7:08:0b

*spamApTask5: Nov 15 09:19:20.703: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa7080b

*spamApTask5: Nov 15 09:19:20.703: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask5: Nov 15 09:19:20.703: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask5: Nov 15 09:19:20.703: ssphmUserCertVerify: calling x509_decode()

*spamApTask5: Nov 15 09:19:20.713: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:19:20.713: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:19:20

*spamApTask5: Nov 15 09:19:20.713: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/10:18:47

*spamApTask5: Nov 15 09:19:20.713: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/10:28:47

*spamApTask5: Nov 15 09:19:20.713: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:19:20.713: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:19:20.714: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:19:20.714: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.714: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.714: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:19:20.721: sshpmFreePublicKeyHandle: called with 0x2c3f7564

*spamApTask5: Nov 15 09:19:20.721: sshpmFreePublicKeyHandle: freeing public key

*spamApTask5: Nov 15 09:19:20.859: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28801) mwar:10.191.8.27(5246)


*spamApTask5: Nov 15 09:19:20.859: 0c:68:03:b9:87:10 Allocated index from main list, Index: 78


*spamApTask5: Nov 15 09:19:20.859: 0c:68:03:b9:87:10 Using CipherSuite AES128-SHA

*spamApTask5: Nov 15 09:19:20.859: 0c:68:03:b9:87:10 DTLS keys for Control Plane are plumbed successfully for AP 10.191.9.204. Index 79


*spamApTask6: Nov 15 09:19:20.859: 0c:68:03:b9:87:10 DTLS Session established server (10.191.8.27:5246), client (10.191.9.204:28801)

*spamApTask6: Nov 15 09:19:20.860: 0c:68:03:b9:87:10 Starting wait join timer for AP: 10.191.9.204:28801


*sshpmLscTask: Nov 15 09:19:42.562: sshpmLscTask: LSC Task received a message 4

*osapiBsnTimer: Nov 15 09:20:20.762: 0c:68:03:b9:87:10 Wait join timer expired for connection 10.191.9.204:28801

*spamApTask5: Nov 15 09:20:20.762: 0c:68:03:b9:87:10 Disconnecting due to a wait join timer expiry event for (10.191.9.204:28801) server details (10.191.8.27:5246)


*spamApTask5: Nov 15 09:20:20.762: 0c:68:03:b9:87:10 Found DTLS connection 0x176cca90, disconnecting it

*spamApTask5: Nov 15 09:20:20.763: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28801) mwar:10.191.8.27(5246)


*spamApTask5: Nov 15 09:20:20.763: 0c:68:03:b9:87:10 DTLS keys for Control Plane deleted successfully for AP 10.191.9.204


*spamApTask5: Nov 15 09:20:20.770: 0c:68:03:b9:87:10 Deleting AP entry 10.191.9.204:28801 from temporary database.

*spamApTask5: Nov 15 09:20:20.771: 0c:68:03:b9:87:10 DTLS connection closed event receivedserver (10.191.8.27/5246) client (10.191.9.204/28801)

*spamApTask5: Nov 15 09:20:20.771: 0c:68:03:b9:87:10 No entry exists for AP (10.191.9.204/28801)

*spamApTask5: Nov 15 09:20:20.771: 0c:68:03:b9:87:10 No AP entry exist in temporary database for 10.191.9.204:28801

*spamApTask6: Nov 15 09:20:29.499: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:20:29.499: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =1

*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =1

*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:20:29.500: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =1

*spamApTask6: Nov 15 09:20:29.501: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28802


*spamApTask6: Nov 15 09:20:29.501: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28802


*spamApTask7: Nov 15 09:20:29.791: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.206(28194) mwar:10.191.8.27(5246)


*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: called to evaluate

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.788: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask7: Nov 15 09:20:39.788: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask7: Nov 15 09:20:39.788: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask7: Nov 15 09:20:39.788: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: called to evaluate

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Nov 15 09:20:39.789: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask7: Nov 15 09:20:39.789: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask7: Nov 15 09:20:39.789: sshpmGetSshPrivateKeyFromCID: match in row 2


*spamApTask7: Nov 15 09:20:40.099: sshpmGetIssuerHandles: locking ca cert table

*spamApTask7: Nov 15 09:20:40.099: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask7: Nov 15 09:20:40.099: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask7: Nov 15 09:20:40.103: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa6e20c, MAILTO=support@cisco.com

*spamApTask7: Nov 15 09:20:40.103: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask7: Nov 15 09:20:40.103: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a6:e2:0c

*spamApTask7: Nov 15 09:20:40.103: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa6e20c

*spamApTask7: Nov 15 09:20:40.103: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: called to evaluate

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask7: Nov 15 09:20:40.103: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask7: Nov 15 09:20:40.103: ssphmUserCertVerify: calling x509_decode()

*spamApTask7: Nov 15 09:20:40.113: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:20:40

*spamApTask7: Nov 15 09:20:40.113: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/07:59:18

*spamApTask7: Nov 15 09:20:40.113: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/08:09:18

*spamApTask7: Nov 15 09:20:40.113: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: called to evaluate

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Nov 15 09:20:40.113: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Nov 15 09:20:40.114: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Nov 15 09:20:40.121: sshpmFreePublicKeyHandle: called with 0x2c14d3e0

*spamApTask7: Nov 15 09:20:40.121: sshpmFreePublicKeyHandle: freeing public key

*spamApTask7: Nov 15 09:20:40.260: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.206(28193) mwar:10.191.8.27(5246)


*spamApTask6: Nov 15 09:20:41.499: 0c:68:03:b9:87:10 DTLS connection not found, creating new connection for 10:191:9:204 (28802) 10:191:8:27 (5246)


*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.499: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.500: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask6: Nov 15 09:20:41.500: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask6: Nov 15 09:20:41.500: sshpmGetSshPrivateKeyFromCID: match in row 2


*spamApTask6: Nov 15 09:20:41.810: sshpmGetIssuerHandles: locking ca cert table

*spamApTask6: Nov 15 09:20:41.810: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask6: Nov 15 09:20:41.810: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask6: Nov 15 09:20:41.814: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa7080b, MAILTO=support@cisco.com

*spamApTask6: Nov 15 09:20:41.814: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask6: Nov 15 09:20:41.814: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a7:08:0b

*spamApTask6: Nov 15 09:20:41.814: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa7080b

*spamApTask6: Nov 15 09:20:41.814: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask6: Nov 15 09:20:41.814: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask6: Nov 15 09:20:41.814: ssphmUserCertVerify: calling x509_decode()

*spamApTask6: Nov 15 09:20:41.824: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:20:41

*spamApTask6: Nov 15 09:20:41.824: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/10:18:47

*spamApTask6: Nov 15 09:20:41.824: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/10:28:47

*spamApTask6: Nov 15 09:20:41.824: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.824: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.825: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:20:41.832: sshpmFreePublicKeyHandle: called with 0x2c3f2c70

*spamApTask6: Nov 15 09:20:41.832: sshpmFreePublicKeyHandle: freeing public key

*spamApTask6: Nov 15 09:20:41.970: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28802) mwar:10.191.8.27(5246)


*spamApTask6: Nov 15 09:20:41.970: 0c:68:03:b9:87:10 Allocated index from main list, Index: 79


*spamApTask6: Nov 15 09:20:41.970: 0c:68:03:b9:87:10 Using CipherSuite AES128-SHA

*spamApTask6: Nov 15 09:20:41.970: 0c:68:03:b9:87:10 DTLS keys for Control Plane are plumbed successfully for AP 10.191.9.204. Index 80


*spamApTask6: Nov 15 09:20:41.971: 0c:68:03:b9:87:10 DTLS Session established server (10.191.8.27:5246), client (10.191.9.204:28802)

*spamApTask6: Nov 15 09:20:41.971: 0c:68:03:b9:87:10 Starting wait join timer for AP: 10.191.9.204:28802


*spamApTask6: Nov 15 09:21:39.332: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28802) mwar:10.191.8.27(5246)


*spamApTask6: Nov 15 09:21:39.332: 0c:68:03:b9:87:10 DTLS keys for Control Plane deleted successfully for AP 10.191.9.204


*spamApTask6: Nov 15 09:21:39.339: 0c:68:03:b9:87:10 DTLS connection was closed

*spamApTask6: Nov 15 09:21:39.339: 0c:68:03:b9:87:10 DTLS connection closed event receivedserver (10.191.8.27/5246) client (10.191.9.204/28802)

*spamApTask6: Nov 15 09:21:39.339: 0c:68:03:b9:87:10 No entry exists for AP (10.191.9.204/28802)

*spamApTask6: Nov 15 09:21:39.340: 0c:68:03:b9:87:10 Deleting AP entry 10.191.9.204:28802 from temporary database.

*spamApTask7: Nov 15 09:21:39.620: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.206(28193) mwar:10.191.8.27(5246)


*sshpmLscTask: Nov 15 09:21:42.392: sshpmLscTask: LSC Task received a message 4

*spamApTask5: Nov 15 09:21:48.440: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28801


*spamApTask5: Nov 15 09:21:48.440: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =0

*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =0

*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28801


*spamApTask5: Nov 15 09:21:48.441: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =0

*spamApTask5: Nov 15 09:21:48.442: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28801


*spamApTask5: Nov 15 09:21:48.442: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28801


*spamApTask5: Nov 15 09:22:12.440: 0c:68:03:b9:87:10 DTLS connection not found, creating new connection for 10:191:9:204 (28801) 10:191:8:27 (5246)


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.441: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask5: Nov 15 09:22:12.441: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask5: Nov 15 09:22:12.441: sshpmGetSshPrivateKeyFromCID: match in row 2


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: called to evaluate

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: called to evaluate

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask0: Nov 15 09:22:12.721: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask0: Nov 15 09:22:12.722: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask0: Nov 15 09:22:12.722: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.722: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.722: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask0: Nov 15 09:22:12.722: sshpmGetSshPrivateKeyFromCID: match in row 2


*spamApTask5: Nov 15 09:22:12.754: sshpmGetIssuerHandles: locking ca cert table

*spamApTask5: Nov 15 09:22:12.754: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask5: Nov 15 09:22:12.754: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask5: Nov 15 09:22:12.758: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa7080b, MAILTO=support@cisco.com

*spamApTask5: Nov 15 09:22:12.758: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask5: Nov 15 09:22:12.758: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a7:08:0b

*spamApTask5: Nov 15 09:22:12.758: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa7080b

*spamApTask5: Nov 15 09:22:12.758: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask5: Nov 15 09:22:12.758: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask5: Nov 15 09:22:12.759: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask5: Nov 15 09:22:12.759: ssphmUserCertVerify: calling x509_decode()

*spamApTask5: Nov 15 09:22:12.769: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:22:12

*spamApTask5: Nov 15 09:22:12.769: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/10:18:47

*spamApTask5: Nov 15 09:22:12.769: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/10:28:47

*spamApTask5: Nov 15 09:22:12.769: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: called to evaluate

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.769: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask5: Nov 15 09:22:12.777: sshpmFreePublicKeyHandle: called with 0x2c14e600

*spamApTask5: Nov 15 09:22:12.777: sshpmFreePublicKeyHandle: freeing public key

*spamApTask5: Nov 15 09:22:12.915: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28801) mwar:10.191.8.27(5246)


*spamApTask5: Nov 15 09:22:12.915: 0c:68:03:b9:87:10 Allocated index from main list, Index: 81


*spamApTask5: Nov 15 09:22:12.915: 0c:68:03:b9:87:10 Using CipherSuite AES128-SHA

*spamApTask5: Nov 15 09:22:12.915: 0c:68:03:b9:87:10 DTLS keys for Control Plane are plumbed successfully for AP 10.191.9.204. Index 82


*spamApTask6: Nov 15 09:22:12.915: 0c:68:03:b9:87:10 DTLS Session established server (10.191.8.27:5246), client (10.191.9.204:28801)

*spamApTask6: Nov 15 09:22:12.915: 0c:68:03:b9:87:10 Starting wait join timer for AP: 10.191.9.204:28801


*spamApTask0: Nov 15 09:22:13.033: sshpmGetIssuerHandles: locking ca cert table

*spamApTask0: Nov 15 09:22:13.033: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask0: Nov 15 09:22:13.033: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask0: Nov 15 09:22:13.037: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa6e20c, MAILTO=support@cisco.com

*spamApTask0: Nov 15 09:22:13.037: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask0: Nov 15 09:22:13.037: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a6:e2:0c

*spamApTask0: Nov 15 09:22:13.037: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa6e20c

*spamApTask0: Nov 15 09:22:13.037: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: called to evaluate

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask0: Nov 15 09:22:13.037: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask0: Nov 15 09:22:13.037: ssphmUserCertVerify: calling x509_decode()

*spamApTask0: Nov 15 09:22:13.047: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:22:13

*spamApTask0: Nov 15 09:22:13.047: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/07:59:18

*spamApTask0: Nov 15 09:22:13.047: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/08:09:18

*spamApTask0: Nov 15 09:22:13.047: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: called to evaluate

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask0: Nov 15 09:22:13.047: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask0: Nov 15 09:22:13.048: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask0: Nov 15 09:22:13.055: sshpmFreePublicKeyHandle: called with 0x2c328d34

*spamApTask0: Nov 15 09:22:13.055: sshpmFreePublicKeyHandle: freeing public key

*spamApTask0: Nov 15 09:22:13.193: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.206(28194) mwar:10.191.8.27(5246)


*apfReceiveTask: Nov 15 09:22:13.197: Split tunnel status (Disabled) encoded in the vap payload for WLAN(1), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.197: Split tunnel status (Disabled) encoded in the vap payload for WLAN(2), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.197: Split tunnel status (Disabled) encoded in the vap payload for WLAN(3), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.197: Split tunnel status (Disabled) encoded in the vap payload for WLAN(4), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.197: Split tunnel status (Disabled) encoded in the vap payload for WLAN(5), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.198: Split tunnel status (Disabled) encoded in the vap payload for WLAN(6), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.198: Split tunnel status (Disabled) encoded in the vap payload for WLAN(7), AP:0c:68:03:d7:c0:20 (slotID 0)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(1), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(2), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(3), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(4), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(5), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(6), AP:0c:68:03:d7:c0:20 (slotID 1)

*apfReceiveTask: Nov 15 09:22:13.199: Split tunnel status (Disabled) encoded in the vap payload for WLAN(7), AP:0c:68:03:d7:c0:20 (slotID 1)

*sshpmMainTask: Nov 15 09:22:35.647: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000

*sshpmMainTask: Nov 15 09:22:46.735: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000

*spamApTask6: Nov 15 09:23:07.547: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:23:07.547: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =2

*spamApTask6: Nov 15 09:23:07.547: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28802


*spamApTask6: Nov 15 09:23:07.547: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:23:07.547: 0c:68:03:b9:87:10 Discovery Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:23:07.548: 0c:68:03:b9:87:10 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 50, joined Aps =2

*spamApTask6: Nov 15 09:23:07.548: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204 port 28802


*spamApTask6: Nov 15 09:23:07.548: 0c:68:03:b9:87:10 Discovery Response sent to 10.191.9.204:28802


*apfMsConnTask_0: Nov 15 09:23:10.421: sending spamAddMobile aclName =


*osapiBsnTimer: Nov 15 09:23:12.792: 0c:68:03:b9:87:10 Wait join timer expired for connection 10.191.9.204:28801

*spamApTask5: Nov 15 09:23:12.793: 0c:68:03:b9:87:10 Disconnecting due to a wait join timer expiry event for (10.191.9.204:28801) server details (10.191.8.27:5246)


*spamApTask5: Nov 15 09:23:12.793: 0c:68:03:b9:87:10 Found DTLS connection 0x176ccef8, disconnecting it

*spamApTask5: Nov 15 09:23:12.793: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28801) mwar:10.191.8.27(5246)


*spamApTask5: Nov 15 09:23:12.793: 0c:68:03:b9:87:10 DTLS keys for Control Plane deleted successfully for AP 10.191.9.204


*spamApTask5: Nov 15 09:23:12.801: 0c:68:03:b9:87:10 Deleting AP entry 10.191.9.204:28801 from temporary database.

*spamApTask5: Nov 15 09:23:12.801: 0c:68:03:b9:87:10 DTLS connection closed event receivedserver (10.191.8.27/5246) client (10.191.9.204/28801)

*spamApTask5: Nov 15 09:23:12.801: 0c:68:03:b9:87:10 No entry exists for AP (10.191.9.204/28801)

*spamApTask5: Nov 15 09:23:12.801: 0c:68:03:b9:87:10 No AP entry exist in temporary database for 10.191.9.204:28801

*apfMsConnTask_0: Nov 15 09:23:13.894: sending spamAddMobile aclName =


*apfMsConnTask_0: Nov 15 09:23:17.305: sending spamAddMobile aclName =


*spamApTask6: Nov 15 09:23:19.546: 0c:68:03:b9:87:10 DTLS connection not found, creating new connection for 10:191:9:204 (28802) 10:191:8:27 (5246)


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: called to get cert for CID 1354397a


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.547: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1354397a

*spamApTask6: Nov 15 09:23:19.547: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<


*spamApTask6: Nov 15 09:23:19.547: sshpmGetSshPrivateKeyFromCID: match in row 2


*spamApTask6: Nov 15 09:23:19.857: sshpmGetIssuerHandles: locking ca cert table

*spamApTask6: Nov 15 09:23:19.857: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask6: Nov 15 09:23:19.857: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask6: Nov 15 09:23:19.861: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-f872eaa7080b, MAILTO=support@cisco.com

*spamApTask6: Nov 15 09:23:19.861: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask6: Nov 15 09:23:19.861: sshpmGetIssuerHandles: Mac Address in subject is f8:72:ea:a7:08:0b

*spamApTask6: Nov 15 09:23:19.861: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-f872eaa7080b

*spamApTask6: Nov 15 09:23:19.861: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: called to get cert for CID 2eb5200a


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<


*spamApTask6: Nov 15 09:23:19.861: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<


*spamApTask6: Nov 15 09:23:19.861: ssphmUserCertVerify: calling x509_decode()

*spamApTask6: Nov 15 09:23:19.871: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetIssuerHandles: ValidityString (current): 2013/11/15/14:23:19

*spamApTask6: Nov 15 09:23:19.871: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/06/06/10:18:47

*spamApTask6: Nov 15 09:23:19.871: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/06/06/10:28:47

*spamApTask6: Nov 15 09:23:19.871: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: called to evaluate

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.871: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Nov 15 09:23:19.879: sshpmFreePublicKeyHandle: called with 0x2c14fd90

*spamApTask6: Nov 15 09:23:19.879: sshpmFreePublicKeyHandle: freeing public key

*spamApTask6: Nov 15 09:23:20.018: acDtlsPlumbControlPlaneKeys: lrad:10.191.9.204(28802) mwar:10.191.8.27(5246)


*spamApTask6: Nov 15 09:23:20.018: 0c:68:03:b9:87:10 Allocated index from main list, Index: 83


*spamApTask6: Nov 15 09:23:20.018: 0c:68:03:b9:87:10 Using CipherSuite AES128-SHA

*spamApTask6: Nov 15 09:23:20.018: 0c:68:03:b9:87:10 DTLS keys for Control Plane are plumbed successfully for AP 10.191.9.204. Index 84


*spamApTask6: Nov 15 09:23:20.018: 0c:68:03:b9:87:10 DTLS Session established server (10.191.8.27:5246), client (10.191.9.204:28802)

*spamApTask6: Nov 15 09:23:20.018: 0c:68:03:b9:87:10 Starting wait join timer for AP: 10.191.9.204:28802


*apfMsConnTask_0: Nov 15 09:23:20.716: sending spamAddMobile aclName =


*spamApTask6: Nov 15 09:23:25.019: 0c:68:03:b9:87:10 Join Request from 10.191.9.204:28802


*spamApTask6: Nov 15 09:23:25.019: 0c:68:03:b9:87:10 Deleting AP entry 10.191.9.204:28802 from temporary database.

*spamApTask6: Nov 15 09:23:25.020: 0c:68:03:b9:87:10 Join Version: = 117794304


*spamApTask6: Nov 15 09:23:25.020: 0c:68:03:b9:87:10 Join resp: CAPWAP Maximum Msg element len = 85


*spamApTask6: Nov 15 09:23:25.020: 0c:68:03:b9:87:10 Join Response sent to 10.191.9.204:28802


*spamApTask6: Nov 15 09:23:25.020: 0c:68:03:b9:87:10 CAPWAP State: Join


It says the AP disassociated due to link failure.  However, the AP's are not losing their connections to the switch. 

Review Cisco Networking for a $25 gift card