cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3051
Views
0
Helpful
9
Replies

1852 APs fail to re-register after power loss

jeremy0023
Level 1
Level 1

I have a 2504 controller and six 1852 access points.  The access points are powered with an SG500-52p switch as the access switch that has a trunk back to my core SG500X-8f8t. The 2504 is trunked back to the core. The access points receive their ip through DHCP and the register through CAPWAP. When first setup, the controller found the access points fine and they registered and have been working great. We had a power loss tot he whole building the other day and they will not register since. They only cycle through red, yellow, green. They are receiving ip addresses from dhcp, just not registering. Any ideas? My next step is to reset all APs abs try to register them one at a time, but I don’t want to do that after every power loss. 

9 Replies 9

Sandeep Choudhary
VIP Alumni
VIP Alumni

As you said these AP were regsited before power outage. So I am sure that there is no comptibiliyt issue of Software /Regulatory domain.

 

could you please paste the bootup process from cisco AP console.

Aslo paste the output of this command from AP: sh version

 

Regards

Dont forget to rate helpful posts

I am trying to use Mac terminal to connect using screen /dev/tty.usbserial 9600. It connects, but I only get a blank screen after the command is entered. No output.

Here is the boot activity. I could not do sh version because it keeps cycling through this:

 

U-Boot 2012.07 (btldr release 31) (Mar 15 2017 - 15:00:35)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM: 1 GiB
NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[1:1], write_counter=4
PCI0 Link Intialized
PCI1 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3at POE detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part2

Booting from part2

Read 1024 bytes from volume part2 to 45000000
Read 19574485 bytes from volume part2 to 45000000
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment

Starting image ...

[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=30M@1280M console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:11.0567] ACPU PVS: 1
[01/01/1970 00:00:11.1766] msm_serial_hs: probe of msm_serial_hs.0 failed with error -2
[01/01/1970 00:00:11.8864] buginf tty flushing thread started, ttyport=ef4a9e90
[01/01/1970 00:00:16.5250] msm_hsusb_host msm_hsusb_host: unable to find transceiver
[*01/01/1970 00:00:16.7549] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:16.7649] Made it into bootsh: Jun 7 2018 14:23:53
[*01/01/1970 00:00:16.7649] bootsh build T-8bfb55bdc885bb02b33a6d3b4b0055e5f22b33cc-g8bfb55bd-vipendya
init started: BusyBox v1.20.2 (2018-06-07 13:21:15 PDT)

 

User Access Verification
Username: [*01/01/1970 00:00:20.0239] Active version: 8.2.170.0
[*01/01/1970 00:00:20.0339] Backup version: 8.2.141.0
[*01/01/1970 00:00:20.2038] AP1852I
[*01/01/1970 00:00:20.2938] nss_driver - Turbo Support 1
[*01/01/1970 00:00:20.2938] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*01/01/1970 00:00:20.7636] Current value of FACTORY_RESET=0
[*01/01/1970 00:00:20.7736] Last reload time: Jan 3 08:48:25 2000
[*06/07/2018 14:25:50.0000] Setting system time Thu Jun 7 14:25:50 UTC 2018
[*06/07/2018 14:25:50.0599]
[*06/07/2018 14:25:50.0599]
[*06/07/2018 14:25:50.0599] === 5G radio domain is 41, COPY 5G BDF files from non_ETSI_BDF folder ===
[*06/07/2018 14:25:50.0599]
[*06/07/2018 14:25:50.0599]
[*06/07/2018 14:25:50.1599] device wired0 entered promiscuous mode
[*06/07/2018 14:25:50.2299] device wired1 entered promiscuous mode
[*06/07/2018 14:25:50.5898] stile_lm_ft_corsica: module license 'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[*06/07/2018 14:25:50.6098] stile_lm_dp_corsica: module license 'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[*06/07/2018 14:25:50.6098] stile module dp init successfully
[*06/07/2018 14:25:50.6098] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR VERSION:module build date: Aug 16 2017 at 14:45:33
[*06/07/2018 14:25:51.0197] miibus get ef61fc00!
[*06/07/2018 14:25:51.0397]
[*06/07/2018 14:25:51.0397] boot 35 build T-8bfb55bdc885bb02b33a6d3b4b0055e5f22b33cc-g8bfb55bd-vipendya board corsica mac 00:38:DF:2A:0B:40
[*06/07/2018 14:25:51.0597] Module: aptrace .text=0xbf000000 data=0xbf0081d8 bss=0xbf0085e0
[*06/07/2018 14:25:51.0597] Module: qca_nss_gmac .text=0xbf00f000 data=0xbf015b40 bss=0xbf016000
[*06/07/2018 14:25:51.0597] Module: qca_nss_drv .text=0xbf01f000 data=0xbf036c70 bss=0xbf037a20
[*06/07/2018 14:25:51.0597] Module: qca_nss_capwapmgr .text=0xbf053000 data=0xbf056b90 bss=0xbf056ce0
[*06/07/2018 14:25:51.0597] Module: nssmgrctl .text=0xbf05c000 data=0xbf05d728 bss=0xbf05da4c
[*06/07/2018 14:25:51.0597] Module: proclikefs .text=0xbf063000 data= bss=0xbf063b40
[*06/07/2018 14:25:51.0597] Module: stile_lm_ft .text= data= bss=
[*06/07/2018 14:25:51.0597] Module: stile_lm_dp .text= data= bss=
[*06/07/2018 14:25:51.0597] Module: qca_nss_profile_drv .text=0xbf8e2000 data=0xbf8e3324 bss=0xbf8e3498
[*06/07/2018 14:25:51.0597] Module: ssdk_reg .text=0xbf8e8000 data= bss=0xbf8e8838
[*06/07/2018 14:25:51.3696] Last reload reason : 0: unknown
[*06/07/2018 14:25:52.6092] adf: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6092] asf: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6192] ath_hal: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6292] ath_dfs: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6292] ath_rate_atheros: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6392] ath_dev: module license 'Proprietary' taints kernel.
[*06/07/2018 14:25:52.6692]
[*06/07/2018 14:25:52.6692] __ol_ath_attach() Allocated scn c3b00480
[*06/07/2018 14:25:52.6792] Chip id: 0x9, chip version: 0x1000000
[*06/07/2018 14:25:52.6792]
[*06/07/2018 14:25:52.6792] Target Version is 1000000
[*06/07/2018 14:25:52.6792]
[*06/07/2018 14:25:52.6792] Flash Download Address c0000
[*06/07/2018 14:25:52.6792] ol_transfer_bin_file: flash data file defined
[*06/07/2018 14:25:52.6792] Cal location [0]: 00000000
[*06/07/2018 14:25:52.6792]
[*06/07/2018 14:25:52.6792] Wifi0 NAND FLASH Select OFFSET 0x1000
[*06/07/2018 14:25:52.6992] qc98xx_verify_checksum: flash checksum passed: 0x21d6
[*06/07/2018 14:25:52.6992] ol_transfer_bin_file 4092: Download Flash data len 12064
[*06/07/2018 14:25:52.7191]
[*06/07/2018 14:25:52.7191] Board data initialized
[*06/07/2018 14:25:52.7591] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660
[*06/07/2018 14:25:52.7591] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*06/07/2018 14:25:52.7591] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin
[*06/07/2018 14:25:52.8391]
[*06/07/2018 14:25:52.8391] [Flash] : Ignore Module param
[*06/07/2018 14:25:52.8391] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*06/07/2018 14:25:52.8491] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*06/07/2018 14:25:53.9588] HTC Rx: insufficient length, got:4 expected =8
[*06/07/2018 14:25:53.9588] Startup Mode-0 set
[*06/07/2018 14:25:53.9588] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/07/2018 14:25:53.9588] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/07/2018 14:25:53.9588] Firmware_Build_Number:5
[*06/07/2018 14:25:53.9588] host/RAM_fw Build Ver Mismatch: H:0x47, F:0x5 !
[*06/07/2018 14:25:53.9588] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffea
[*06/07/2018 14:25:53.9588]
[*06/07/2018 14:25:53.9588] RES CFG Support wmi_service_bitmap 9778
[*06/07/2018 14:25:53.9588]
[*06/07/2018 14:25:53.9588] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 10 to TGT
[*06/07/2018 14:25:53.9588] Mesh Supported
[*06/07/2018 14:25:54.0387] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/07/2018 14:25:54.0387] ACS not enabled
[*06/07/2018 14:25:54.0387] ol_ath_thermal_mitigation_attach: --
[*06/07/2018 14:25:54.0487]
[*06/07/2018 14:25:54.0487] __ol_ath_attach() Allocated scn ee540480
[*06/07/2018 14:25:54.0587] Chip id: 0x9, chip version: 0x1000000
[*06/07/2018 14:25:54.0587]
[*06/07/2018 14:25:54.0587] Target Version is 1000000
[*06/07/2018 14:25:54.0587]
[*06/07/2018 14:25:54.0587] Flash Download Address c0000
[*06/07/2018 14:25:54.0587] ol_transfer_bin_file: flash data file defined
[*06/07/2018 14:25:54.0587] Cal location [1]: 00004000
[*06/07/2018 14:25:54.0587]
[*06/07/2018 14:25:54.0587] wifi1 NAND FLASH Select OFFSET 0x5000
[*06/07/2018 14:25:54.0787] qc98xx_verify_checksum: flash checksum passed: 0xa074
[*06/07/2018 14:25:54.0787] ol_transfer_bin_file 4092: Download Flash data len 12064
[*06/07/2018 14:25:54.0987]
[*06/07/2018 14:25:54.0987] Board data initialized
[*06/07/2018 14:25:54.1487] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return param 4660
[*06/07/2018 14:25:54.1487] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*06/07/2018 14:25:54.1487] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_5G_v2_007.bin
[*06/07/2018 14:25:54.2187]
[*06/07/2018 14:25:54.2187] [Flash] : Ignore Module param
[*06/07/2018 14:25:54.2187] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*06/07/2018 14:25:54.2387] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*06/07/2018 14:25:54.9584] FWLOG: [25119] WAL_DBGID_AST_DEL_WDS_ENTRY ( 0xdeadc0de, 0xea, 0x32 )
[*06/07/2018 14:25:54.9584] FWLOG: [25190] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:54.9584] FWLOG: [25190] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:54.9584] FWLOG: [25190] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:54.9584] FWLOG: [25190] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:55.3283] HTC Rx: insufficient length, got:4 expected =8
[*06/07/2018 14:25:55.3283] Startup Mode-0 set
[*06/07/2018 14:25:55.3283] HTC Service:0x0300 ep:1 TX flow control disabled
[*06/07/2018 14:25:55.3383] HTC Service:0x0100 ep:2 TX flow control disabled
[*06/07/2018 14:25:55.3383] Firmware_Build_Number:5
[*06/07/2018 14:25:55.3383] host/RAM_fw Build Ver Mismatch: H:0x47, F:0x5 !
[*06/07/2018 14:25:55.3383] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x0000ffea
[*06/07/2018 14:25:55.3383]
[*06/07/2018 14:25:55.3383] RES CFG Support wmi_service_bitmap 9778
[*06/07/2018 14:25:55.3383]
[*06/07/2018 14:25:55.3383] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 10 to TGT
[*06/07/2018 14:25:55.3383] Mesh Supported
[*06/07/2018 14:25:55.4083] wmi_ready_event_rx: WMI UNIFIED READY event
[*06/07/2018 14:25:55.4183] acfg_attach: Offload using existing sock eec96200
[*06/07/2018 14:25:55.4183] ACS not enabled
[*06/07/2018 14:25:55.4183] ol_ath_thermal_mitigation_attach: --
[*06/07/2018 14:25:55.4183] ath_pktlog: module license 'unspecified' taints kernel.
[*06/07/2018 14:25:55.4283] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*06/07/2018 14:25:55.4283] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*06/07/2018 14:25:56.3280] FWLOG: [26487] WAL_DBGID_AST_DEL_WDS_ENTRY ( 0xdeadc0de, 0xea, 0x32 )
[*06/07/2018 14:25:56.3280] FWLOG: [26556] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:56.3280] FWLOG: [26556] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:56.3280] FWLOG: [26556] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:56.3280] FWLOG: [26556] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*06/07/2018 14:25:56.3280] FWLOG: [26565] UNKNOWN 22:55 ( 0x3a, 0x10, 0x0, 0x10, 0x0 )
[*06/07/2018 14:25:56.9078] click-config/io-real.click:73: While configuring 'todev_nsscapwap0 :: ToDevice':
[*06/07/2018 14:25:56.9078] warning: device 'nsscapwap0' is down
[*06/07/2018 14:25:56.9278] click-config/io-real.click:73: While configuring 'fromdev_nsscapwap0 :: FromDevice':
[*06/07/2018 14:25:56.9278] warning: device 'nsscapwap0' is down
[*06/07/2018 14:25:57.5676] pid 1451's current affinity mask: 3
[*06/07/2018 14:25:57.5676] pid 1451's new affinity mask: 1
[*06/07/2018 14:25:58.1574] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*06/07/2018 14:25:58.1574] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*06/07/2018 14:25:59.3971]
[*06/07/2018 14:25:59.3971] phy_value=0: org="0x1000" phy_reg="0x1000"
[*06/07/2018 14:25:59.5170] wired0: 1000 Mbps Full Duplex
[*06/07/2018 14:25:59.5170]
[*06/07/2018 14:26:00.5867]
[*06/07/2018 14:26:00.5867] Click sched monitor: schedulers = 1
[*06/07/2018 14:26:03.4558] ethernet_port wired0, ip 10.10.0.36, netmask 255.255.0.0, gw 10.10.0.20, mtu 1500, bcast 10.10.255.255, dns1 10.20.0.100, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*06/07/2018 14:26:13.6726] Loading sha2...
[*06/07/2018 14:26:13.6726] Dumpping sha1...
[*06/07/2018 14:26:14.7123] Loading MIC cert and key
[*06/07/2018 14:26:14.7123] Dumpping sha2...
[*06/07/2018 14:26:15.8219] Loading MIC cert and key
[*06/07/2018 14:26:15.8219] /etc/init.d/S80cisco: line 162: /usr/bin/show_skun.lua: not found
[*06/07/2018 14:26:15.8619] Generating key, this may take a while...
[*06/07/2018 14:26:17.0216] Public key portion is:
[*06/07/2018 14:26:17.0216] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCryxHE85E3LMUmLz1GaYZVqI9jCZmMsy0M69gWAzeS/Ooqyj6T7VjlOLztVEEz/hKCBBSlgZWLxy3qIAh9VJj0FxlY6zOtclmukbNhY/8TJ/stc5Q3YbjMPqOn3DYxTzQ9a50k9sUDB04ZAbzBjqYXikXnBz8pjhGETs/akYosBFdYz+eqCIqCtzN4TmKM9jkhpXp9jbF1DQ3d1Q5splF7YbwBUhMWmIwKOVU8tzNAPfVZ8Bt7uwTC8hEOYptccy1s7smJ+rqTX2pX9jnLo8as6pjGSNz5AsfHK/ShQxcrBQamijACXmuU6mhWvYxvImQ3Y5OMqsNk+6uH02s42J/H root@m0038DF2A0B40
[*06/07/2018 14:26:17.0216] Fingerprint: md5 09:18:6b:c8:b4:76:34:cd:79:37:f2:0c:b4:82:30:63
[*06/07/2018 14:26:17.0615] pid 2706's current affinity mask: 3
[*06/07/2018 14:26:17.0615] pid 2706's new affinity mask: 1
[*06/07/2018 14:26:17.1515] Password for 'Cisco' changed
[*06/07/2018 14:26:17.1615] Failed to get HW address: rc -1
[*06/07/2018 14:26:17.1615]
[*06/07/2018 14:26:17.2515] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/41/g' -e 's/__PRODUCT_ID__/AIR-AP1852I-B-K9/g' -e 's/__AP_TYPE__/48/g' -e 's/__WIRELESS_MAC__/00:38:DF:2A:93:60/g' -e 's/__WIRED_MAC__/00:38:DF:2A:0B:40/g' -e 's/__WIRED1_MAC__/00:38:DF:2A:0B:40/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*06/07/2018 14:26:18.3511] DOT11_DRV[1]: Init Radio1
[*06/07/2018 14:26:18.3811] DOT11_DRV[1]: Stop Radio1
[*06/07/2018 14:26:18.3811] DOT11_DRV[1]: set_channel Channel set to 36
[*06/07/2018 14:26:18.3911] DOT11_DRV[0]: Init Radio0
[*06/07/2018 14:26:18.4211] DOT11_DRV[0]: Stop Radio0
[*06/07/2018 14:26:18.4211] DOT11_DRV[0]: set_channel Channel set to 6
[*06/07/2018 14:26:18.4511] DOT11_DRV[0]: set_channel Channel set to 11
[*06/07/2018 14:26:18.4611] DOT11_DRV[0]: Channel set to 11, width 20
[*06/07/2018 14:26:18.4611] DOT11_DRV[0]: Channel set to 11, width 20
[*06/07/2018 14:26:18.4811] DOT11_DRV[1]: set_channel Channel set to 44
[*06/07/2018 14:26:18.4811] DOT11_DRV[1]: Channel set to 44, width 40
[*06/07/2018 14:26:18.4811] DOT11_DRV[1]: Channel set to 44, width 40
[*06/07/2018 14:26:18.4911] WTP IP Address = 10.10.0.36
[*06/07/2018 14:26:18.5211] DOT11_DRV[0]: Channel set to 11, width 20
[*06/07/2018 14:26:18.5211] DOT11_DRV[0]: Channel set to 11, width 20
[*06/07/2018 14:26:18.5311] DOT11_DRV[1]: Channel set to 44, width 40
[*06/07/2018 14:26:18.5311] DOT11_DRV[1]: Channel set to 44, width 40
[*06/07/2018 14:26:18.5311] CAPWAP State: Discovery
[*06/07/2018 14:26:18.5411] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*06/07/2018 14:26:18.5411] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*06/07/2018 14:26:18.5411] CAPWAP State: Init
[*06/07/2018 14:26:18.5411] CAPWAP State: Discovery
[*06/07/2018 14:26:19.5508] Discovery Response from 10.10.0.30
[*01/03/2000 12:36:55.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:36:55.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:36:55.0599] Bad certificate alert received from peer.
[*01/03/2000 12:36:55.0599] DTLS: Received packet 0x1a95000 caused DTLS to close connection
[*01/03/2000 12:36:55.0599]
[*01/03/2000 12:36:55.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:36:55.0599]
[*01/03/2000 12:36:55.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:36:55.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:36:55.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:36:55.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:36:55.0499] Bad certificate alert received from peer.
[*01/03/2000 12:36:55.0499] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:36:55.0499]
[*01/03/2000 12:36:55.0499] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:36:55.0499]
[*01/03/2000 12:36:55.0499] Restarting CAPWAP State Machine.
[*01/03/2000 12:36:55.0499] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:36:55.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:36:59.7485] CAPWAP State: Discovery
[*01/03/2000 12:36:59.7585] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:36:59.7585] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:36:59.7585] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:14.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:14.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:14.0599] Bad certificate alert received from peer.
[*01/03/2000 12:37:14.0599] DTLS: Received packet 0x1a9b000 caused DTLS to close connection
[*01/03/2000 12:37:14.0599]
[*01/03/2000 12:37:14.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:14.0599]
[*01/03/2000 12:37:14.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:14.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:14.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:14.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:14.0599] Bad certificate alert received from peer.
[*01/03/2000 12:37:14.0599] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:37:14.0599]
[*01/03/2000 12:37:14.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:14.0599]
[*01/03/2000 12:37:14.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:14.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:14.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:18.7385] CAPWAP State: Discovery
[*01/03/2000 12:37:18.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:37:18.7485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:37:18.7485] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:33.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:33.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:33.0599] Bad certificate alert received from peer.
[*01/03/2000 12:37:33.0599] DTLS: Received packet 0x1a9b000 caused DTLS to close connection
[*01/03/2000 12:37:33.0599]
[*01/03/2000 12:37:33.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:33.0599]
[*01/03/2000 12:37:33.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:33.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:33.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:33.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:33.0599] Bad certificate alert received from peer.
[*01/03/2000 12:37:33.0599] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:37:33.0599]
[*01/03/2000 12:37:33.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:33.0599]
[*01/03/2000 12:37:33.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:33.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:33.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:37.7485] CAPWAP State: Discovery
[*01/03/2000 12:37:37.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:37:37.7485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:37:37.7485] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:52.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:37:52.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:52.0699] Bad certificate alert received from peer.
[*01/03/2000 12:37:52.0699] DTLS: Received packet 0x1a97000 caused DTLS to close connection
[*01/03/2000 12:37:52.0699]
[*01/03/2000 12:37:52.0699] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:52.0699]
[*01/03/2000 12:37:52.0699] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:52.0699] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:52.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:52.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:37:52.0599] Bad certificate alert received from peer.
[*01/03/2000 12:37:52.0599] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:37:52.0599]
[*01/03/2000 12:37:52.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:37:52.0599]
[*01/03/2000 12:37:52.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:37:52.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:37:52.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:37:56.7385] CAPWAP State: Discovery
[*01/03/2000 12:37:56.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:37:56.7485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:37:56.7485] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:11.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:11.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:11.0599] Bad certificate alert received from peer.
[*01/03/2000 12:38:11.0599] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:38:11.0599]
[*01/03/2000 12:38:11.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:11.0599]
[*01/03/2000 12:38:11.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:11.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:11.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:11.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:11.0599] Bad certificate alert received from peer.
[*01/03/2000 12:38:11.0599] DTLS: Received packet 0x1a95000 caused DTLS to close connection
[*01/03/2000 12:38:11.0599]
[*01/03/2000 12:38:11.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:11.0599]
[*01/03/2000 12:38:11.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:11.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:11.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:15.7385] CAPWAP State: Discovery
[*01/03/2000 12:38:15.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:38:15.7485] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:38:15.7485] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:30.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:30.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:30.0599] Bad certificate alert received from peer.
[*01/03/2000 12:38:30.0599] DTLS: Received packet 0x1a95000 caused DTLS to close connection
[*01/03/2000 12:38:30.0599]
[*01/03/2000 12:38:30.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:30.0599]
[*01/03/2000 12:38:30.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:30.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:30.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:30.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:30.0599] Bad certificate alert received from peer.
[*01/03/2000 12:38:30.0599] DTLS: Received packet 0x1a97000 caused DTLS to close connection
[*01/03/2000 12:38:30.0599]
[*01/03/2000 12:38:30.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:30.0599]
[*01/03/2000 12:38:30.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:30.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:30.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:34.7385] CAPWAP State: Discovery
[*01/03/2000 12:38:34.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:38:34.7585] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:38:34.7585] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:49.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:38:49.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:49.0599] Bad certificate alert received from peer.
[*01/03/2000 12:38:49.0599] DTLS: Received packet 0x1a97000 caused DTLS to close connection
[*01/03/2000 12:38:49.0599]
[*01/03/2000 12:38:49.0599] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:49.0599]
[*01/03/2000 12:38:49.0599] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:49.0599] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:49.0599] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:49.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:38:49.0699] Bad certificate alert received from peer.
[*01/03/2000 12:38:49.0699] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:38:49.0699]
[*01/03/2000 12:38:49.0699] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:38:49.0699]
[*01/03/2000 12:38:49.0699] Restarting CAPWAP State Machine.
[*01/03/2000 12:38:49.0699] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:38:49.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:38:53.7385] CAPWAP State: Discovery
[*01/03/2000 12:38:53.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:38:53.7585] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:38:53.7585] Discovery Response from 10.10.0.30
[*01/03/2000 12:39:08.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:39:08.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:39:08.0699] Bad certificate alert received from peer.
[*01/03/2000 12:39:08.0699] DTLS: Received packet 0x1a99000 caused DTLS to close connection
[*01/03/2000 12:39:08.0699]
[*01/03/2000 12:39:08.0699] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:39:08.0699]
[*01/03/2000 12:39:08.0699] Restarting CAPWAP State Machine.
[*01/03/2000 12:39:08.0699] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:39:08.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:39:08.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:39:08.0599] Bad certificate alert received from peer.
[*01/03/2000 12:39:08.0699] DTLS: Received packet 0x1a95000 caused DTLS to close connection
[*01/03/2000 12:39:08.0699]
[*01/03/2000 12:39:08.0699] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:39:08.0699]
[*01/03/2000 12:39:08.0699] Restarting CAPWAP State Machine.
[*01/03/2000 12:39:08.0699] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:39:08.0699] CAPWAP State: DTLS Teardown
[*01/03/2000 12:39:12.7485] CAPWAP State: Discovery
[*01/03/2000 12:39:12.7485] Discovery Request sent to 10.10.0.30, discovery type STATIC_CONFIG(1)
[*01/03/2000 12:39:12.7585] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/03/2000 12:39:12.7585] Discovery Response from 10.10.0.30
[*01/03/2000 12:39:27.0000] Discovery Response from 10.10.0.30
[*01/03/2000 12:39:27.0000] CAPWAP State: DTLS Setup
[*01/03/2000 12:39:27.0699] Bad certificate alert received from peer.
[*01/03/2000 12:39:27.0699] DTLS: Received packet 0x1a95000 caused DTLS to close connection
[*01/03/2000 12:39:27.0699]
[*01/03/2000 12:39:27.0699] Lost connection to the controller, going to restart CAPWAP...
[*01/03/2000 12:39:27.0699]
[*01/03/2000 12:39:27.0699] Restarting CAPWAP State Machine.
[*01/03/2000 12:39:27.0699] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3).
[*01/03/2000 12:39:27.0699] CAPWAP State: DTLS Teardown

 

Screen Shot 2018-10-13 at 11.25.01 AM.pngWow, I found it...the NTP server I was using was down. The system time was wrong. I got it working and everything registered. Thank you!

johnd2310
Level 8
Level 8

Hi,

What controller discovery method are you using for the access points i.e. how do the access points find the controller? What is the error in the logs on the controller and AP?

 

Thanks

John

**Please rate posts you find helpful**

CAPWAP for the discovery method.

 

I am trying to use Mac terminal to connect using screen /dev/tty.usbserial 9600. It connects, but I only get a blank screen after the command is entered. No output, so I can not read any error logs.

see above boot process

jeremy0023
Level 1
Level 1

Wow! I got it working. The NTP server was down and the system time could not update. I got it working, the system time updated, and the APs registered. Can anyone explain why that is necessary for the system time to be right?

The APs and WLCs exchange certificates during the JOIN process.  If the time is inaccurate it could mean that the certificates appear to have either expired, or not yet become valid.

 

NTP is essential and should always be configured and working.

Review Cisco Networking for a $25 gift card