Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Access point not getting registered with Vwlc

Posted on 2016-09-14
31
Medium Priority
?
814 Views
Last Modified: 2016-09-30
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

after setting the
capwap ap ip address 192.168.10.250 255.255.255.0
capwap ap  default-gateway 192.168.10.254
capwap ap controller 192.168.10.251
0
Comment
Question by:Shaikh ALI
  • 18
  • 13
31 Comments
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41798888
If the AP and WLC are on the same VLAN and subnet you don't need to set the WLC IP on the AP.  Configure DHCP and let the AP get an IP, then it'll use the subnet broadcast method to find the WLC.

What AP and WLC do you have, and what code is on the WLC?
0
 

Author Comment

by:Shaikh ALI
ID: 41798919
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
!
ip dhcp excluded-address 192.168.10.200 192.168.10.254
!
Switch configuration
!
ip dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
   option 43 hex c0a8.0afb
!
ip dhcp-server 192.168.10.253
!
 inter range fastEthernet 0/3 ,fas 0/9
Des connected to AP and Desktop=VWLC
  switchport
  switchport mode access
  switchport access vlan 10

=========

Controller Detail
Controller Summary
Management IP Address      10.10.10.251 , ::/128
Service Port IP Address      
192.168.10.251 , ::/128
Software Version      8.3.102.0
Emergency Image Version      
8.3.102.0
System Name      Vwlc
0
 

Author Comment

by:Shaikh ALI
ID: 41798930
Topology  vWLC
0
WatchGuard Case Study: Museum of Flight

“With limited money and limited staffing, we didn’t have a lot of choices in terms of what we could do to bring efficiency. WatchGuard played a central part in changing that.” To provide strong, secure Wi-Fi access within the museum, Hunter chose to deploy WatchGuard’s AP120 APs.

 
LVL 47

Expert Comment

by:Craig Beck
ID: 41800409
Ok just remove the option 43 command from the DHCP pool - it's incorrect. Doing that will let the AP discover the WLC using a subnet broadcast.
0
 

Author Comment

by:Shaikh ALI
ID: 41800596
p dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
!
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255

After doing that i was getting this error
Ap try fto send broadcast packet but not able to find wlc do i need to do any configuration on wlc

I have reseted the  Ap
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41800715
Can you ping the WLC?
0
 

Author Comment

by:Shaikh ALI
ID: 41800736
Yes both the way i  can ping from wlc and from Ap
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41801134
What model AP do you have?
0
 

Author Comment

by:Shaikh ALI
ID: 41801257
Cisco AIR-CAP2702I-E-K9
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41802417
The vWLC neefs to have the management address in the 192.168.10.0/24 subnet. The service port is out-of-band management so APs can't talk to the vWLC on that port. Swap them round.
0
 

Author Comment

by:Shaikh ALI
ID: 41802452
If i Swap the ip address  i am not able to ping the Management  ip from which is  192.168.10.251 /24 . The same ip if i put in service port i am able to ping and open GUI for vWLC.

Thanks
0
 

Author Comment

by:Shaikh ALI
ID: 41802468
Controller ip address
0
 

Author Comment

by:Shaikh ALI
ID: 41802470
i have change the ip address  to management interface . In this case i am not able to ping  may this is because if vlan tag as on management interface it is TAG to vlan 10  if we give this ip to service interface
it will not be tag and it will work .

Regards
0
 

Author Comment

by:Shaikh ALI
ID: 41802520
The service interface cannot be use for Ap-manager  .  Management interface is not able to pick the ip address from DHCP the same service-port is able to take the ip address from DHCP .
i think hear is our problem . IF i get solution for this my problem can be solved.

Thanks
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41802662
You need a static IP on thr management interface in the 192.168.10.0 subnet. The VLAN tag should be set to 0 if you're not using a native VLAN on the switch ports where the WLC connects. What VLAN is the vSwitch on?
0
 

Author Comment

by:Shaikh ALI
ID: 41802695
I have static ip to managemnt interface
192.168.10.251 and untaged as i have made the port on switch as access port i dont have vswitch as i have installed that on  vmware workstation.
0
 

Author Comment

by:Shaikh ALI
ID: 41802936
After long time i change my vWLC  version to AIR_CTVM_LARGE-K9_8_3_102_0 (2),
!
Hear is my DHCP config and interface config can u pls check where i am wrong
!
if i do vlan Tagging on VWLC than i am not able to access it , if untag i am able to access it
!

interface FastEthernet0/3
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
end

SW2#show running-config interface fastEthernet 0/9
Building configuration...

Current configuration : 108 bytes
!
interface FastEthernet0/9
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
!
vlan 10
!
10   FOR_VMWARE                       active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/23
!

*Mar  1 11:15:58.631: %SYS-5-RELOAD: Reload requested by CAPWAP CLIENT. Reload Reason: Could not discover WLC using configured vlan tag 10, Reload  to failover to untagged.
*Mar  1 11:15:58.647: %LWAPP-5-CHANGED: CAPWAP changed state to DOWN
!

Sep 17 13:09:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:09:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:09:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251

*Sep 17 13:11:46.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:11:47.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:11:48.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:48.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:11:48.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:11:49.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:49.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:11:49.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:11:49.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:11:49.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:11:50.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:11:50.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:50.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:11:51.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:57.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:12:02.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 

Author Comment

by:Shaikh ALI
ID: 41802939
APf07f.068d.98d0#
*Sep 17 13:15:32.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:26.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:16:27.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:16:28.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:28.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:16:28.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:16:29.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:29.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:16:29.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:16:29.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:16:29.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:16:30.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:16:30.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:30.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:16:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803067
If you're using VMWare Workstation don't tag. Don't bother with the service port either - you can admin via console.
0
 

Author Comment

by:Shaikh ALI
ID: 41803075
I am not tagging as all r in same VLAN , they can ping each other as if u see my up AP log  the AP is trying to register but not getting register there is some configuration problem ....

Can u pls check the log
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803090
Can you show the logs from the WLC?
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803093
I need to see a log while the AP searches and reloads too. It joins, then disconnects.
0
 

Author Comment

by:Shaikh ALI
ID: 41803123
(Cisco Controller) >debug capwap detail enable

(Cisco Controller) >debug capwap *spamApTask1: Sep 17 19:25:22.638: f0:7f:06:8d:                                               98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:25:23.608: CAPWAP Timer Msg

*spamApTask1: Sep 17 19:25:23.608: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49ba8                                                closed by controller
*spamApTask1: Sep 17 19:25:23.608: CAPWAP DTLS connection closed msg

*spamApTask0: Sep 17 19:25:40.728: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:50.701: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.703: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 DTLS connection 0x14b49e10 established
*spamApTask7: Sep 17 19:25:50.933: CAPWAP DTLS session established msg

*spamApTask0: Sep 17 19:25:50.935: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:5569                   4

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:55.920: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 9

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:26:50.548: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:26:51.554: CAPWAP Timer Msg

*spamApTask0: Sep 17 19:26:51.554: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49e10 closed by controller
*spamApTask0: Sep 17 19:26:51.554: CAPWAP DTLS connection closed msg

*spamApTask1: Sep 17 19:27:08.638: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:18.612: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.613: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.840: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 DTLS connection 0x14b4a078 established
*spamApTask7: Sep 17 19:27:18.844: CAPWAP DTLS session established msg

*spamApTask1: Sep 17 19:27:18.846: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1118

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask1: Sep 17 19:27:18.848: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:23.830: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 9
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803125
I'm seeing an expired MIC cert in the log.

Try setting the year to 2013 on the WLC and see if that works. If it does, let your APs join then correct the year.
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803127
You could also try a recent LWAPP recovery image on the APs.
0
 

Author Comment

by:Shaikh ALI
ID: 41803141
Oct 10 07:48:01.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:48:01.027: %PKI-3-CERTIFICATE_INVALID_NOT_YET_VALID: Certificate chain validation has failed.  The certificate (SN: 1000) is not yet valid   Validity period starts on 11:36:52 UTC Sep 17 2016Peer certificate verification failed 001A

Oct 10 07:48:01.027: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:509 Certificate verified failed!
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 192.168.10.251:5246
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
Oct 10 07:49:06.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:49:11.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.10.251:5246
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41803536
What date/time is on the vWLC?
0
 

Author Comment

by:Shaikh ALI
ID: 41809385
It is 21 sep 2016.
I manually change it to 2013 both the place .
I change the topology i connect AP direct to my pc skiping switch than also the same result both vwlc and ap r receving packet but ap not vetting register.
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 41810823
What is the time on the AP?

Can you post the following outputs from the vWLC console...?

show sysinfo
show time
show interface summary
show interface detailed management
show ap join stats detailed <AP_MAC_ADDRESS>
0
 

Accepted Solution

by:
Shaikh ALI earned 0 total points
ID: 41814937
Thanks for your help i brought physical WLC AND MY AP got registered  as i am running out of time
0
 

Author Closing Comment

by:Shaikh ALI
ID: 41823165
Time limit
0

Featured Post

Choose an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question