- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 05:17 AM
Hello,
I have a WLC2504 with 10 licenses running 8.5.151.0.
I have several 3602 AP's with AC radio module that previously could join the controller, but now don't join the controller anymore.
As reason for the failed join attempt I read: Missing AP Manager IPV6 interface. However, the configuration has not changed.
Also. I have 3700 series and 3800 series AP's that can join.
I have been reading news about a security certificate that has expired. Could this have something to do with the AP's not joining? Is there an updated software version that addresses this software issue?
Kind regards,
Niels van Strien
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 06:25 AM
Hi,
First disable IPV6:
■ From GUI: Controller tab → General → Global IPv6 Config → [Select disable]
■ From CLI : config ipv6 disable
and second: if certificate expired then try this solution as well!
config ap cert-expiry-ignore mic enable
https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
Regards
Dont forget to rate helpful posts
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 08:02 AM
- Probably the config ap cert-expiry-ignore mic enable , is the most important one, in this case the ipv6 messages can be ignored since it was disabled too ,
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 05:47 AM
>...: Missing AP Manager IPV6 interface.
- Is this log from the AP or controller ? Meaning post both and or if needed post the (an) AP 3602 boot process (?)
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 06:03 AM
Hello M,
Just writing to let you know that I am an end-user in a residential setting with some experience configuring the wlc, but without deep knowledge. I attached the message log from the controller to this message. Perhaps it is easy for you to spot what is wrong.
Kind regards,
Niels van Strien
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 06:25 AM
Hi,
First disable IPV6:
■ From GUI: Controller tab → General → Global IPv6 Config → [Select disable]
■ From CLI : config ipv6 disable
and second: if certificate expired then try this solution as well!
config ap cert-expiry-ignore mic enable
https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html
Regards
Dont forget to rate helpful posts
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 06:38 AM
- As suggested by other reply use (on controller ) : config ap cert-expiry-ignore mic enable
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 06:55 AM
Ok disabled and rebooted the wlc2504. The message log now says the info below.
The config ap cert-expiry-ignore mic enable command can only be issued when connected directly to the wlc via CLI, correct?
Thanks,
Niels
Message Uploaded at Jan 24 15:52:14.240.
*spamApTask6: Jan 24 15:52:11.973: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.101
*spamApTask6: Jan 24 15:52:11.973: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask5: Jan 24 15:52:10.235: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.31
*spamApTask5: Jan 24 15:52:10.235: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask6: Jan 24 15:50:56.981: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.101
*spamApTask6: Jan 24 15:50:56.980: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask5: Jan 24 15:50:55.264: %DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:981 Failed to complete DTLS handshake with peer 192.168.1.31
*spamApTask5: Jan 24 15:50:55.263: %SSHPM-3-GENERIC_CERT_ERROR: sshpmPkiApi.c:2237 Certificate validation failed! Reason Cisco user certificate not verified by cisco root., Certificate type : MIC, Certificate issuer :Cisco Certificate
*spamApTask3: Jan 24 15:50:53.026: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:62:73:ad:6f:b0
*sntpReceiveTask: Jan 24 15:50:50.413: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*sntpReceiveTask: Jan 24 15:50:48.413: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*sntpReceiveTask: Jan 24 15:50:46.409: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172.
*nim_t: Jan 24 15:50:41.133: %SIM-3-PORT_UP: sim.c:13902 Physical port 1 is up!.
*cpuAclLogTask: Jan 24 15:50:40.954: %ACL-3-CPU_ACL_LOG_UCAPL_DISABLED: acl.c:1361 UCAPL disabled. CPU ACL hits will not be logged.
*bcastDataTask: Jan 24 15:50:35.547: %APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination: (::) whencapwap multicast mode is multicast with unconfigured ipv6 address.
*fp_main_task: Jan 24 15:50:22.721: %CNFGR-3-INV_COMP_ID: cnfgr.c:4138 Invalid Component Id : Unrecognized (45) in cfgConfiguratorInit.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 07:15 AM
yes you can run this command via CLI: config ap cert-expiry-ignore mic enable
Regards
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 07:21 AM
>....The config ap cert-expiry-ignore mic enable command can only be issued when connected directly to the wlc via CLI, correct
Yes, but the reboot was not needed for testing (then you need to save the configuration too) , but I would like to focus first on a few other items seen in the output provided :
>....SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:128.138.141.172
>...APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination:
It looks like ipv6 is being used or configured , if not ipv6 is not needed could you try : config ipv6 disable , save the configuration , reboot and try again, post the same logs again afterwards too ,
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 07:46 AM
Hi again - it was a while since I used the CLI over serial but I managed to connect and issue both commands:
config ap cert-expiry-ignore mic enable
config ipv6 disable
and then saved the configuration, performed a reboot. The access points that previously did not join the controller are now joining again. I do see some more ipv6 errors in my message log whereas the controller returned that ipv6 was globally disabled already when I issued the config ipv6 disable command:
*spamApTask4: Jan 24 16:43:08.557: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:da:d2:90:6d:e0
*spamApTask0: Jan 24 16:43:06.986: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 04:62:73:ad:6f:b0
*spamApTask7: Jan 24 16:43:06.662: %LWAPP-3-VENDOR_PLD_VALIDATE_ERR: spam_lrad.c:12016 Validation of SPAM_VENDOR_SPECIFIC_PAYLOAD(185) with length=9 failed - AP 1c:e6:c7:0c:66:b0
*sntpReceiveTask: Jan 24 16:43:01.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*sntpReceiveTask: Jan 24 16:42:59.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*sntpReceiveTask: Jan 24 16:42:57.605: %SNTP-3-FATAL_ERROR_OCCURED: sntp_main.c:233 Fatal error: : unable to send NTP packet to ::ffff:86.80.166.233.
*nim_t: Jan 24 16:42:52.345: %SIM-3-PORT_UP: sim.c:13902 Physical port 1 is up!.
*cpuAclLogTask: Jan 24 16:42:52.168: %ACL-3-CPU_ACL_LOG_UCAPL_DISABLED: acl.c:1361 UCAPL disabled. CPU ACL hits will not be logged.
*bcastDataTask: Jan 24 16:42:45.571: %APF-3-INVALID_MCAST_MODE_ADDR: apf_net.c:5070 Received ipv6 capwap multicast packet source: (fe80::3aed:18ff:fe50:b240) destination: (::) whencapwap multicast mode is multicast with unconfigured ipv6 address.
*fp_main_task: Jan 24 16:42:33.953: %CNFGR-3-INV_COMP_ID: cnfgr.c:4138 Invalid Component Id : Unrecognized (45) in cfgConfiguratorInit.
.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 08:02 AM
- Probably the config ap cert-expiry-ignore mic enable , is the most important one, in this case the ipv6 messages can be ignored since it was disabled too ,
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 08:08 AM
Thank you so much for your help. Will there be a software update made available in which these certificates have been renewed?
Kind regards,
Niels van Strien
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2023 09:11 AM
- No because that is a built-in certificate on the access point , hence they provided the config ap cert-expiry-ignore mic enable , command as a workaround ,
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-27-2023 03:34 AM - edited 12-12-2023 02:45 AM
Make sure you're familiar with the details of all the field notices mentioned in my signature below. There's another certificate issue which will come into play after 4th December 2022 if you try download software to any APs using that old code - fixed in 8.10.190.0 (and later) or 8.5.182.11. Obviously you can't upgrade to 8.10.190.0 on 2504 or with 3602 APs so you'll have to upgrade to the special escalation image 8.5.182.11 if you have that problem (link below).
Please click Helpful if this post helped you and Select as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's and TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's, Best Practices for 9800 WLC's and Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-27-2023 03:40 AM
Hello Rich,
Thanks for your helpful addition. I think I should update the software to 8.5.182.7 to be sure all will continue to work. How can I obtain 8.5.182.7 - I don't have an active software license, nor do I see it listed on the downloads.
Kind regards,
Niels
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-27-2023 03:59 AM
The field notice https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72524.html refers to https://www.cisco.com/c/en/us/support/docs/wireless/aironet-700-series-access-points/218447-ios-ap-image-download-fails-due-to-expir.html which in turn has the link to the AireOS software downloads https://software.cisco.com/download/specialrelease/8f166c6d88b9f77aabb63f78affa9749
Not sure whether you'll be able to access that without a contract but give it a try ...
Please click Helpful if this post helped you and Select as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's and TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's, Best Practices for 9800 WLC's and Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390
