Solved

Access point not getting registered with Vwlc

Posted on 2016-09-14
31
73 Views
Last Modified: 2016-09-30
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

after setting the
capwap ap ip address 192.168.10.250 255.255.255.0
capwap ap  default-gateway 192.168.10.254
capwap ap controller 192.168.10.251
0
Comment
Question by:Shaikh ALI
  • 18
  • 13
31 Comments
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
If the AP and WLC are on the same VLAN and subnet you don't need to set the WLC IP on the AP.  Configure DHCP and let the AP get an IP, then it'll use the subnet broadcast method to find the WLC.

What AP and WLC do you have, and what code is on the WLC?
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
!
ip dhcp excluded-address 192.168.10.200 192.168.10.254
!
Switch configuration
!
ip dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
   option 43 hex c0a8.0afb
!
ip dhcp-server 192.168.10.253
!
 inter range fastEthernet 0/3 ,fas 0/9
Des connected to AP and Desktop=VWLC
  switchport
  switchport mode access
  switchport access vlan 10

=========

Controller Detail
Controller Summary
Management IP Address      10.10.10.251 , ::/128
Service Port IP Address      
192.168.10.251 , ::/128
Software Version      8.3.102.0
Emergency Image Version      
8.3.102.0
System Name      Vwlc
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Topology  vWLC
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Ok just remove the option 43 command from the DHCP pool - it's incorrect. Doing that will let the AP discover the WLC using a subnet broadcast.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
p dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
!
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255

After doing that i was getting this error
Ap try fto send broadcast packet but not able to find wlc do i need to do any configuration on wlc

I have reseted the  Ap
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Can you ping the WLC?
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Yes both the way i  can ping from wlc and from Ap
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
What model AP do you have?
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Cisco AIR-CAP2702I-E-K9
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
The vWLC neefs to have the management address in the 192.168.10.0/24 subnet. The service port is out-of-band management so APs can't talk to the vWLC on that port. Swap them round.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
If i Swap the ip address  i am not able to ping the Management  ip from which is  192.168.10.251 /24 . The same ip if i put in service port i am able to ping and open GUI for vWLC.

Thanks
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Controller ip address
0
 

Author Comment

by:Shaikh ALI
Comment Utility
i have change the ip address  to management interface . In this case i am not able to ping  may this is because if vlan tag as on management interface it is TAG to vlan 10  if we give this ip to service interface
it will not be tag and it will work .

Regards
0
 

Author Comment

by:Shaikh ALI
Comment Utility
The service interface cannot be use for Ap-manager  .  Management interface is not able to pick the ip address from DHCP the same service-port is able to take the ip address from DHCP .
i think hear is our problem . IF i get solution for this my problem can be solved.

Thanks
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
You need a static IP on thr management interface in the 192.168.10.0 subnet. The VLAN tag should be set to 0 if you're not using a native VLAN on the switch ports where the WLC connects. What VLAN is the vSwitch on?
0
How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

 

Author Comment

by:Shaikh ALI
Comment Utility
I have static ip to managemnt interface
192.168.10.251 and untaged as i have made the port on switch as access port i dont have vswitch as i have installed that on  vmware workstation.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
After long time i change my vWLC  version to AIR_CTVM_LARGE-K9_8_3_102_0 (2),
!
Hear is my DHCP config and interface config can u pls check where i am wrong
!
if i do vlan Tagging on VWLC than i am not able to access it , if untag i am able to access it
!

interface FastEthernet0/3
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
end

SW2#show running-config interface fastEthernet 0/9
Building configuration...

Current configuration : 108 bytes
!
interface FastEthernet0/9
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
!
vlan 10
!
10   FOR_VMWARE                       active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/23
!

*Mar  1 11:15:58.631: %SYS-5-RELOAD: Reload requested by CAPWAP CLIENT. Reload Reason: Could not discover WLC using configured vlan tag 10, Reload  to failover to untagged.
*Mar  1 11:15:58.647: %LWAPP-5-CHANGED: CAPWAP changed state to DOWN
!

Sep 17 13:09:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:09:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:09:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251

*Sep 17 13:11:46.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:11:47.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:11:48.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:48.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:11:48.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:11:49.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:49.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:11:49.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:11:49.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:11:49.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:11:50.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:11:50.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:50.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:11:51.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:57.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:12:02.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 

Author Comment

by:Shaikh ALI
Comment Utility
APf07f.068d.98d0#
*Sep 17 13:15:32.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:26.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:16:27.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:16:28.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:28.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:16:28.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:16:29.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:29.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:16:29.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:16:29.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:16:29.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:16:30.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:16:30.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:30.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:16:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
If you're using VMWare Workstation don't tag. Don't bother with the service port either - you can admin via console.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
I am not tagging as all r in same VLAN , they can ping each other as if u see my up AP log  the AP is trying to register but not getting register there is some configuration problem ....

Can u pls check the log
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Can you show the logs from the WLC?
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
I need to see a log while the AP searches and reloads too. It joins, then disconnects.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
(Cisco Controller) >debug capwap detail enable

(Cisco Controller) >debug capwap *spamApTask1: Sep 17 19:25:22.638: f0:7f:06:8d:                                               98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:25:23.608: CAPWAP Timer Msg

*spamApTask1: Sep 17 19:25:23.608: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49ba8                                                closed by controller
*spamApTask1: Sep 17 19:25:23.608: CAPWAP DTLS connection closed msg

*spamApTask0: Sep 17 19:25:40.728: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:50.701: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.703: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 DTLS connection 0x14b49e10 established
*spamApTask7: Sep 17 19:25:50.933: CAPWAP DTLS session established msg

*spamApTask0: Sep 17 19:25:50.935: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:5569                   4

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:55.920: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 9

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:26:50.548: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:26:51.554: CAPWAP Timer Msg

*spamApTask0: Sep 17 19:26:51.554: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49e10 closed by controller
*spamApTask0: Sep 17 19:26:51.554: CAPWAP DTLS connection closed msg

*spamApTask1: Sep 17 19:27:08.638: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:18.612: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.613: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.840: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 DTLS connection 0x14b4a078 established
*spamApTask7: Sep 17 19:27:18.844: CAPWAP DTLS session established msg

*spamApTask1: Sep 17 19:27:18.846: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1118

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask1: Sep 17 19:27:18.848: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:23.830: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 9
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
I'm seeing an expired MIC cert in the log.

Try setting the year to 2013 on the WLC and see if that works. If it does, let your APs join then correct the year.
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
You could also try a recent LWAPP recovery image on the APs.
0
 

Author Comment

by:Shaikh ALI
Comment Utility
Oct 10 07:48:01.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:48:01.027: %PKI-3-CERTIFICATE_INVALID_NOT_YET_VALID: Certificate chain validation has failed.  The certificate (SN: 1000) is not yet valid   Validity period starts on 11:36:52 UTC Sep 17 2016Peer certificate verification failed 001A

Oct 10 07:48:01.027: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:509 Certificate verified failed!
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 192.168.10.251:5246
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
Oct 10 07:49:06.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:49:11.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.10.251:5246
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
What date/time is on the vWLC?
0
 

Author Comment

by:Shaikh ALI
Comment Utility
It is 21 sep 2016.
I manually change it to 2013 both the place .
I change the topology i connect AP direct to my pc skiping switch than also the same result both vwlc and ap r receving packet but ap not vetting register.
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
What is the time on the AP?

Can you post the following outputs from the vWLC console...?

show sysinfo
show time
show interface summary
show interface detailed management
show ap join stats detailed <AP_MAC_ADDRESS>
0
 

Accepted Solution

by:
Shaikh ALI earned 0 total points
Comment Utility
Thanks for your help i brought physical WLC AND MY AP got registered  as i am running out of time
0
 

Author Closing Comment

by:Shaikh ALI
Comment Utility
Time limit
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now