Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1136
  • Last Modified:

Access point not getting registered with Vwlc

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

after setting the
capwap ap ip address 192.168.10.250 255.255.255.0
capwap ap  default-gateway 192.168.10.254
capwap ap controller 192.168.10.251
0
Shaikh ALI
Asked:
Shaikh ALI
  • 18
  • 13
1 Solution
 
Craig BeckCommented:
If the AP and WLC are on the same VLAN and subnet you don't need to set the WLC IP on the AP.  Configure DHCP and let the AP get an IP, then it'll use the subnet broadcast method to find the WLC.

What AP and WLC do you have, and what code is on the WLC?
0
 
Shaikh ALIAuthor Commented:
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
!
ip dhcp excluded-address 192.168.10.200 192.168.10.254
!
Switch configuration
!
ip dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
   option 43 hex c0a8.0afb
!
ip dhcp-server 192.168.10.253
!
 inter range fastEthernet 0/3 ,fas 0/9
Des connected to AP and Desktop=VWLC
  switchport
  switchport mode access
  switchport access vlan 10

=========

Controller Detail
Controller Summary
Management IP Address      10.10.10.251 , ::/128
Service Port IP Address      
192.168.10.251 , ::/128
Software Version      8.3.102.0
Emergency Image Version      
8.3.102.0
System Name      Vwlc
0
 
Shaikh ALIAuthor Commented:
Topology  vWLC
0
Get Cisco Certified in IT Security

There’s a high demand for IT security experts and network administrators who can safeguard the data that individuals, corporations, and governments rely on every day. Pursue your B.S. in Network Operations and Security and gain the credentials you need for this high-growth field.

 
Craig BeckCommented:
Ok just remove the option 43 command from the DHCP pool - it's incorrect. Doing that will let the AP discover the WLC using a subnet broadcast.
0
 
Shaikh ALIAuthor Commented:
p dhcp pool DHCP
   network 192.168.10.0 255.255.255.0
   default-router 192.168.10.254
   dns-server 192.168.10.254
!
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255

After doing that i was getting this error
Ap try fto send broadcast packet but not able to find wlc do i need to do any configuration on wlc

I have reseted the  Ap
0
 
Craig BeckCommented:
Can you ping the WLC?
0
 
Shaikh ALIAuthor Commented:
Yes both the way i  can ping from wlc and from Ap
0
 
Craig BeckCommented:
What model AP do you have?
0
 
Shaikh ALIAuthor Commented:
Cisco AIR-CAP2702I-E-K9
0
 
Craig BeckCommented:
The vWLC neefs to have the management address in the 192.168.10.0/24 subnet. The service port is out-of-band management so APs can't talk to the vWLC on that port. Swap them round.
0
 
Shaikh ALIAuthor Commented:
If i Swap the ip address  i am not able to ping the Management  ip from which is  192.168.10.251 /24 . The same ip if i put in service port i am able to ping and open GUI for vWLC.

Thanks
0
 
Shaikh ALIAuthor Commented:
Controller ip address
0
 
Shaikh ALIAuthor Commented:
i have change the ip address  to management interface . In this case i am not able to ping  may this is because if vlan tag as on management interface it is TAG to vlan 10  if we give this ip to service interface
it will not be tag and it will work .

Regards
0
 
Shaikh ALIAuthor Commented:
The service interface cannot be use for Ap-manager  .  Management interface is not able to pick the ip address from DHCP the same service-port is able to take the ip address from DHCP .
i think hear is our problem . IF i get solution for this my problem can be solved.

Thanks
0
 
Craig BeckCommented:
You need a static IP on thr management interface in the 192.168.10.0 subnet. The VLAN tag should be set to 0 if you're not using a native VLAN on the switch ports where the WLC connects. What VLAN is the vSwitch on?
0
 
Shaikh ALIAuthor Commented:
I have static ip to managemnt interface
192.168.10.251 and untaged as i have made the port on switch as access port i dont have vswitch as i have installed that on  vmware workstation.
0
 
Shaikh ALIAuthor Commented:
After long time i change my vWLC  version to AIR_CTVM_LARGE-K9_8_3_102_0 (2),
!
Hear is my DHCP config and interface config can u pls check where i am wrong
!
if i do vlan Tagging on VWLC than i am not able to access it , if untag i am able to access it
!

interface FastEthernet0/3
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
end

SW2#show running-config interface fastEthernet 0/9
Building configuration...

Current configuration : 108 bytes
!
interface FastEthernet0/9
 switchport access vlan 10
 switchport mode access
 spanning-tree portfast
!
vlan 10
!
10   FOR_VMWARE                       active    Fa0/3, Fa0/4, Fa0/5, Fa0/6
                                                Fa0/7, Fa0/8, Fa0/9, Fa0/23
!

*Mar  1 11:15:58.631: %SYS-5-RELOAD: Reload requested by CAPWAP CLIENT. Reload Reason: Could not discover WLC using configured vlan tag 10, Reload  to failover to untagged.
*Mar  1 11:15:58.647: %LWAPP-5-CHANGED: CAPWAP changed state to DOWN
!

Sep 17 13:09:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:09:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:09:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:09:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251

*Sep 17 13:11:46.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:11:47.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:11:47.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:11:47.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:11:47.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:11:48.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:48.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:11:48.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:11:49.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:49.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:11:49.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:11:49.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:11:49.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:11:50.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:11:50.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:11:50.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:11:51.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:11:57.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:11:57.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
*Sep 17 13:12:02.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 
Shaikh ALIAuthor Commented:
APf07f.068d.98d0#
*Sep 17 13:15:32.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:26.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 17 13:16:27.071: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 17 13:16:27.091: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 17 13:16:27.091: [m102x_set_lanport_config] Cannot enable AUX port while POE, connect AC or Inj source
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Sep 17 13:16:27.107: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Sep 17 13:16:28.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:28.139: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Sep 17 13:16:28.147: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 17 13:16:29.131: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:29.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Sep 17 13:16:29.167: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 17 13:16:29.175: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Sep 17 13:16:29.183: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 17 13:16:30.167: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 17 13:16:30.175: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Sep 17 13:16:30.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 17 13:16:31.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 17 13:16:37.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.10.251 peer_port: 5246
*Sep 17 13:16:37.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
APf07f.068d.98d0#
*Sep 17 13:16:42.231: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.10.251
0
 
Craig BeckCommented:
If you're using VMWare Workstation don't tag. Don't bother with the service port either - you can admin via console.
0
 
Shaikh ALIAuthor Commented:
I am not tagging as all r in same VLAN , they can ping each other as if u see my up AP log  the AP is trying to register but not getting register there is some configuration problem ....

Can u pls check the log
0
 
Craig BeckCommented:
Can you show the logs from the WLC?
0
 
Craig BeckCommented:
I need to see a log while the AP searches and reloads too. It joins, then disconnects.
0
 
Shaikh ALIAuthor Commented:
(Cisco Controller) >debug capwap detail enable

(Cisco Controller) >debug capwap *spamApTask1: Sep 17 19:25:22.638: f0:7f:06:8d:                                               98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:25:23.608: CAPWAP Timer Msg

*spamApTask1: Sep 17 19:25:23.608: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49ba8                                                closed by controller
*spamApTask1: Sep 17 19:25:23.608: CAPWAP DTLS connection closed msg

*spamApTask0: Sep 17 19:25:40.728: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.728: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:40.729: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask0: Sep 17 19:25:40.729: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask0: Sep 17 19:25:40.730: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask0: Sep 17 19:25:50.701: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.703: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.929: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.933: f0:7f:06:8d:98:d0 DTLS connection 0x14b49e10 established
*spamApTask7: Sep 17 19:25:50.933: CAPWAP DTLS session established msg

*spamApTask0: Sep 17 19:25:50.935: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:5569                   4

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask0: Sep 17 19:25:50.935: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:25:55.920: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55694

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 vali                   dated

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 9

*spamApTask0: Sep 17 19:25:55.920: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask0: Sep 17 19:26:50.548: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55694

*spamApTask0: Sep 17 19:26:51.554: CAPWAP Timer Msg

*spamApTask0: Sep 17 19:26:51.554: fc:5b:39:e5:e7:f0 DTLS connection 0x14b49e10 closed by controller
*spamApTask0: Sep 17 19:26:51.554: CAPWAP DTLS connection closed msg

*spamApTask1: Sep 17 19:27:08.638: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.638: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:08.639: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 packet received of length 189 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:08.639: fc:5b:39:e5:e7:f0 Msg Type = 1 Capwap state = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 20

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 160

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 62 msgEleType = 38

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 94

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 40 msgEleType = 39

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 50

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 41

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 45

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 1 msgEleType = 44

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 10 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 26

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 msgEleLength = 22 msgEleType = 37

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 1. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 2. 232 3

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 3. 0 0

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 4. 184 11

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: AC Descriptor message element len = 40

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 acName = Cisco_60:3b:54

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp:AC Name message element length = 58

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: WTP Radio Information msg length = 67

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV4 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: CAPWAP Control IPV6 Address len = 77

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Mwar type payload len = 88

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Expire MIC type payload len = 102

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 Discovery resp: Time sync payload len = 117

*spamApTask1: Sep 17 19:27:08.640: fc:5b:39:e5:e7:f0 WTP already released
*spamApTask1: Sep 17 19:27:18.612: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.613: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.839: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.840: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.843: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.844: f0:7f:06:8d:98:d0 DTLS connection 0x14b4a078 established
*spamApTask7: Sep 17 19:27:18.844: CAPWAP DTLS session established msg

*spamApTask1: Sep 17 19:27:18.846: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 packet received of length 1400 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.846: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1348

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1282

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1238

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1218

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1210

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1205

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1200

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1192

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1186

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1169

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1155

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1150

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1127

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1118

*spamApTask1: Sep 17 19:27:18.847: fc:5b:39:e5:e7:f0 Total msgEleLen = 1109

*spamApTask1: Sep 17 19:27:18.848: fc:5b:39:e5:e7:f0 Total msgEleLen = 0

*spamApTask1: Sep 17 19:27:23.830: f0:7f:06:8d:98:d0 CAPWAP Control Msg Received from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 packet received of length 283 from 192.168.10.250:55695

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Msg Type = 3 Capwap state = 0

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Vendor specific payload from AP  FC:5B:39:E5:E7:F0 validated

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 239

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 173

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 129

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 109

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 101

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 96

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 91

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 83

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 77

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 60

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 46

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 41

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 18

*spamApTask1: Sep 17 19:27:23.830: fc:5b:39:e5:e7:f0 Total msgEleLen = 9
0
 
Craig BeckCommented:
I'm seeing an expired MIC cert in the log.

Try setting the year to 2013 on the WLC and see if that works. If it does, let your APs join then correct the year.
0
 
Craig BeckCommented:
You could also try a recent LWAPP recovery image on the APs.
0
 
Shaikh ALIAuthor Commented:
Oct 10 07:48:01.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:48:01.027: %PKI-3-CERTIFICATE_INVALID_NOT_YET_VALID: Certificate chain validation has failed.  The certificate (SN: 1000) is not yet valid   Validity period starts on 11:36:52 UTC Sep 17 2016Peer certificate verification failed 001A

Oct 10 07:48:01.027: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:509 Certificate verified failed!
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 192.168.10.251:5246
Oct 10 07:48:01.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
Oct 10 07:49:06.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.10.251 peer_port: 5246
Oct 10 07:49:11.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.10.251:5246
Oct 10 07:49:11.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.10.251:5246
0
 
Craig BeckCommented:
What date/time is on the vWLC?
0
 
Shaikh ALIAuthor Commented:
It is 21 sep 2016.
I manually change it to 2013 both the place .
I change the topology i connect AP direct to my pc skiping switch than also the same result both vwlc and ap r receving packet but ap not vetting register.
0
 
Craig BeckCommented:
What is the time on the AP?

Can you post the following outputs from the vWLC console...?

show sysinfo
show time
show interface summary
show interface detailed management
show ap join stats detailed <AP_MAC_ADDRESS>
0
 
Shaikh ALIAuthor Commented:
Thanks for your help i brought physical WLC AND MY AP got registered  as i am running out of time
0
 
Shaikh ALIAuthor Commented:
Time limit
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

What Kind of Coding Program is Right for You?

There are many ways to learn to code these days. From coding bootcamps like Flatiron School to online courses to totally free beginner resources. The best way to learn to code depends on many factors, but the most important one is you. See what course is best for you.

  • 18
  • 13
Tackle projects and never again get stuck behind a technical roadblock.
Join Now