cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5935
Views
56
Helpful
17
Replies

WLC2504 Access Point not joining

Hello,

I have a WLC2504 with 10 licenses running 8.5.151.0.

I have several 3602 AP's with AC radio module that previously could join the controller, but now don't join the controller anymore. 

As reason for the failed join attempt I read: Missing AP Manager IPV6 interface. However, the configuration has not changed.

Also. I have 3700 series and 3800 series AP's that can join.

I have been reading news about a security certificate that has expired. Could this have something to do with the AP's not joining? Is there an updated software version that addresses this software issue?

Kind regards,

Niels van Strien

 

 

 

 

 

2 Accepted Solutions

Accepted Solutions

Hi,

 

First disable IPV6:

 

■ From GUI: Controller tab → General → Global IPv6 Config → [Select disable]

■ From CLI : config ipv6 disable

 

and second: if certificate expired then try this solution as well!

config ap cert-expiry-ignore mic enable

https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html

 

Regards

Dont forget to rate helpful posts

View solution in original post

 

 - Probably the config ap cert-expiry-ignore mic enable , is the most important one, in this case the ipv6 messages can be ignored since it was disabled too ,

M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

View solution in original post

17 Replies 17

marce1000
VIP
VIP

 

                              >...: Missing AP Manager IPV6 interface. 
 - Is this log from the AP or controller ? Meaning post both and or if needed post the (an) AP 3602 boot process (?)


 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Hello M,

Just writing to let you know that I am an end-user in a residential setting with some experience configuring the wlc, but without deep knowledge. I attached the message log from the controller to this message. Perhaps it is easy for you to spot what is wrong.

Kind regards,

Niels van Strien

 

 

Hi,

 

First disable IPV6:

 

■ From GUI: Controller tab → General → Global IPv6 Config → [Select disable]

■ From CLI : config ipv6 disable

 

and second: if certificate expired then try this solution as well!

config ap cert-expiry-ignore mic enable

https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html

 

Regards

Dont forget to rate helpful posts

 

 - As suggested by other reply use (on controller ) : config ap cert-expiry-ignore mic enable

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Ok disabled and rebooted the wlc2504. The message log now says the info below.

The config ap cert-expiry-ignore mic enable command can only be issued when connected directly to the wlc via CLI, correct?

Thanks,

Niels

 

Message Uploaded at Jan 24 15:52:14.240.

*spamApTask6: Jan 24 15:52:11.973: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.101

*spamApTask6: Jan 24 15:52:11.973: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask5: Jan 24 15:52:10.235: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.31

*spamApTask5: Jan 24 15:52:10.235: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask6: Jan 24 15:50:56.981: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.101

*spamApTask6: Jan 24 15:50:56.980: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask5: Jan 24 15:50:55.264: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.31

*spamApTask5: Jan 24 15:50:55.263: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask3: Jan 24 15:50:53.026: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:62:73:ad:6f:b0
*sntpReceiveTask: Jan 24 15:50:50.413: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*sntpReceiveTask: Jan 24 15:50:48.413: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*sntpReceiveTask: Jan 24 15:50:46.409: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*nim_t: Jan 24 15:50:41.133: %SIM-3-PORT_UP: sim.c:13902 Physical port 1 is up!.
*cpuAclLogTask: Jan 24 15:50:40.954: %ACL-3-CPU_ACL_LOG_UCAPL_DISABLED: acl.c:1361 UCAPL disabled. CPU ACL hits will not be logged.
*bcastDataTask: Jan 24 15:50:35.547: %APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination: (::) whencapwap multicast mode is multicast with unconfigured ipv6 address.
*fp_main_task: Jan 24 15:50:22.721: %CNFGR-3-INV_COMP_ID: cnfgr.c:4138 Invalid Component Id : Unrecognized (45) in cfgConfiguratorInit.

yes you can run this command via CLI: config ap cert-expiry-ignore mic enable

 

Regards

 

   >....The config ap cert-expiry-ignore mic enable command can only be issued when connected directly to the wlc via CLI, correct
   Yes, but the reboot was not needed for testing (then you need to save the configuration too) , but I would like to focus first on a few other items seen in the output provided :
            >....SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172
            >...APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination
       It looks like ipv6 is being used or configured , if not ipv6 is not  needed could you try : config ipv6 disable , save the configuration , reboot and try  again, post the same logs again afterwards too , 

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Hi again - it was a while since I used the CLI over serial but I managed to connect and issue both commands:

config ap cert-expiry-ignore mic enable
config ipv6 disable

and then saved the configuration, performed a reboot. The access points that previously did not join the controller are now joining again. I do see some more ipv6 errors in my message log whereas the controller returned that ipv6 was globally disabled already when I issued the config ipv6 disable command:

*spamApTask4: Jan 24 16:43:08.557: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:da:d2:90:6d:e0
*spamApTask0: Jan 24 16:43:06.986: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:62:73:ad:6f:b0
*spamApTask7: Jan 24 16:43:06.662: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 1c:e6:c7:0c:66:b0
*sntpReceiveTask: Jan 24 16:43:01.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*sntpReceiveTask: Jan 24 16:42:59.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*sntpReceiveTask: Jan 24 16:42:57.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*nim_t: Jan 24 16:42:52.345: %SIM-3-PORT_UP: sim.c:13902 Physical port 1 is up!.
*cpuAclLogTask: Jan 24 16:42:52.168: %ACL-3-CPU_ACL_LOG_UCAPL_DISABLED: acl.c:1361 UCAPL disabled. CPU ACL hits will not be logged.
*bcastDataTask: Jan 24 16:42:45.571: %APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination: (::) whencapwap multicast mode is multicast with unconfigured ipv6 address.
*fp_main_task: Jan 24 16:42:33.953: %CNFGR-3-INV_COMP_ID: cnfgr.c:4138 Invalid Component Id : Unrecognized (45) in cfgConfiguratorInit.

 

 

.

 

 

 

 - Probably the config ap cert-expiry-ignore mic enable , is the most important one, in this case the ipv6 messages can be ignored since it was disabled too ,

M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Thank you so much for your help. Will there be a software update made available in which these certificates have been renewed?

Kind regards,

Niels van Strien

 

 

 - No because that is a built-in certificate on the access point , hence they provided the config ap cert-expiry-ignore mic enable , command as a workaround , 

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Rich R
VIP
VIP

Make sure you're familiar with the details of all the field notices mentioned in my signature below.  There's another certificate issue which will come into play after 4th December 2022 if you try download software to any APs using that old code - fixed in 8.10.190.0 (and later) or 8.5.182.11.  Obviously you can't upgrade to 8.10.190.0 on 2504 or with 3602 APs so you'll have to upgrade to the special escalation image 8.5.182.11 if you have that problem (link below).

Hello Rich,

Thanks for your helpful addition. I think I should update the software to 8.5.182.7 to be sure all will continue to work. How can I obtain 8.5.182.7 -  I don't have an active software license, nor do I see it listed on the downloads.

Kind regards,

Niels

 

Rich R
VIP
VIP

The field notice https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72524.html refers to https://www.cisco.com/c/en/us/support/docs/wireless/aironet-700-series-access-points/218447-ios-ap-image-download-fails-due-to-expir.html which in turn has the link to the AireOS software downloads https://software.cisco.com/download/specialrelease/8f166c6d88b9f77aabb63f78affa9749

Not sure whether you'll be able to access that without a contract but give it a try ...

Review Cisco Networking for a $25 gift card