×

Warning message

  • Cisco Support Forums is in Read Only mode while the site is being migrated.
  • Cisco Support Forums is in Read Only mode while the site is being migrated.

Failing to add aironet1231 to wlc5508

Unanswered Question
Jul 9th, 2012
User Badges:

Hi everyone,

I'm having little success migrating our older Aironet1231 to our new WLC 5508. The 1231 is currently registered as a LAP to a 4400 WLC and I'm in the process of moving away from this controller to the new one.  I've pasted the output of the error messages I'm getting below.  At this point, I'm stuck and not sure how to get around the "Failed to parse CAPWAP packet" error.


I'm getting these messages when I have:

debug pm pki enable

debug capwap errors enable


I initially got this error, but got passed it when I allowed SSC in the 5508 (Security -> AP Policies)

sshpmGetIssuerHandles: SSC is not allowed by config; bailing...


Now I'm getting these:

*sshpmLscTask: Jul 09 11:13:11.516: sshpmLscTask: LSC Task received a message 4

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCertFromCID: called to get cert for CID 10535b71

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<

*spamApTask7: Jul 09 11:13:16.042: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetSshPrivateKeyFromCID: called to get key for CID 10535b71

*spamApTask7: Jul 09 11:13:16.043: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.043: sshpmGetSshPrivateKeyFromCID: match in row 2

*spamApTask7: Jul 09 11:13:16.229: sshpmGetIssuerHandles: locking ca cert table

*spamApTask7: Jul 09 11:13:16.229: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask7: Jul 09 11:13:16.229: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask7: Jul 09 11:13:16.235: sshpmGetIssuerHandles: <subject> L=San Jose, ST=California, C=US, O=Cisco Systems, [email protected], CN=C1200-001121200dcf

*spamApTask7: Jul 09 11:13:16.235: sshpmGetIssuerHandles: <issuer>  L=San Jose, ST=California, C=US, O=Cisco Systems, [email protected], CN=C1200-001121200dcf

*spamApTask7: Jul 09 11:13:16.235: sshpmGetIssuerHandles: Mac Address in subject is 00:11:21:20:0d:cf

*spamApTask7: Jul 09 11:13:16.235: sshpmGetIssuerHandles: Cert Name in subject is C1200-001121200dcf

*spamApTask7: Jul 09 11:13:16.235: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask7: Jul 09 11:13:16.270: ssphmSsUserCertVerify: self-signed user cert verfied.

*spamApTask7: Jul 09 11:13:16.270: sshpmGetIssuerHandles: ValidityString (current): 2012/07/09/18:13:16

*spamApTask7: Jul 09 11:13:16.270: sshpmGetIssuerHandles: ValidityString (NotBefore): 2008/06/15/13:11:14

*spamApTask7: Jul 09 11:13:16.270: sshpmGetIssuerHandles: ValidityString (NotAfter): 2020/01/01/00:00:00

*spamApTask7: Jul 09 11:13:16.270: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask7: Jul 09 11:13:16.270: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask7: Jul 09 11:13:16.270: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.271: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask7: Jul 09 11:13:16.272: sshpmGetIssuerHandles: Calculate SHA1 hash on Public Key Data

*spamApTask7: Jul 09 11:13:16.272: sshpmGetIssuerHandles: Key Data  ...........................

  ......................................................................................................................................

*spamApTask7: Jul 09 11:13:16.273: sshpmGetIssuerHandles: SSC Key Hash is ..................................

*spamApTask7: Jul 09 11:13:16.273: sshpmFreePublicKeyHandle: called with 0x2db61184

*spamApTask7: Jul 09 11:13:16.273: sshpmFreePublicKeyHandle: freeing public key

*spamApTask7: Jul 09 11:13:17.906: 00:11:5c:9e:76:30 State machine handler: Failed to process  msg type = 3 state = 0 from 10.0.1.162:1245

*spamApTask7: Jul 09 11:13:17.906: 00:11:5c:9e:76:30 Failed to parse CAPWAP packet from 10.0.1.162:1245

*spamApTask7: Jul 09 11:13:17.909: 00:11:5c:9e:76:30 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.0.1.162:1245)since DTLS session is not established



The AP is making the DTLS session with the old one, but not the new controller

*Jul  9 18:17:46.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 18:17:47.807: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 18:20:09.815: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.101.222

*Jul  9 18:20:09.815: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN

*Jul  9 18:20:10.631: %CAPWAP-5-CHANGED: CAPWAP changed state to CFG

*Jul  9 18:20:13.975: %CAPWAP-5-CHANGED: CAPWAP changed state to UP

*Jul  9 18:20:14.277: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller WLC2


addtl info:

4400 version - 7.0.98.218

5508 version - 7.0.98.218

Both WLCs are managed by a WCS



Thanks in advance,


JP

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
Amjad Abdullah Mon, 07/09/2012 - 12:07
User Badges:
  • Red, 2250 points or more

Hi JB,


Can you confirm that you configured the hash for the SSC correctly?

If yes then plz try to upgrade to later version if possible to eliminate any bugs.

Can you show s output from AP console during the join process?


Sent from Cisco Technical Support iPad App

lacinfosys Mon, 07/09/2012 - 13:30
User Badges:

Here's a screen shot of the new WLC's secuirty AP policies.


Here's the AP's output during the join process:

Translating "CISCO-LWAPP-CONTROLLER.lakeavechurch.org"...domain server (172.17.21.4) [OK]

Translating "CISCO-CAPWAP-CONTROLLER.lakeavechurch.org"...domain server (172.17.21.4) [OK]

*Mar  1 00:00:05.749: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed

*Mar  1 00:00:06.957: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0

*Mar  1 00:00:07.078: %LWAPP-3-CLIENTEVENTLOG: Read and initialized AP event log (contains, 1024 messages)

*Mar  1 00:00:07.120:  status of voice_diag_test from WLC is false

*Mar  1 00:00:08.144:  STUB Called : crypto_ssl_init

*Mar  1 00:00:09.189: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up

*Mar  1 00:00:09.251: %SYS-5-RESTART: System restarted --


*Mar  1 00:00:09.368: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Mar  1 00:00:09.385: %DOT11-6-FREQ_SCAN: Interface Dot11Radio0, Scanning frequencies for 27 seconds

*Mar  1 00:00:10.189: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to up

*Mar  1 00:00:10.383: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

*Mar  1 00:00:10.389: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY

*Mar  1 00:00:10.389: bsnInitRcbSlot: slot 1 has NO radio

*Mar  1 00:00:10.718: SSC Load Current Size crypto_mykey 120, offset 9390, Saved Size soap_cert_crypto_mykey 124

*Mar  1 00:00:10.722: %SSH-5-ENABLED: SSH 2.0 has been enabled

*Mar  1 00:00:10.722: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Mar  1 00:00:10.775: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Mar  1 00:00:11.176: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Mar  1 00:00:12.176: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up

*Mar  1 00:00:28.926:  status of voice_diag_test from WLC is false

*Mar  1 00:00:29.224: Logging LWAPP message to 255.255.255.255.

*Mar  1 00:00:29.282: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Mar  1 00:00:29.294: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Mar  1 00:00:30.295: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 started - CLI initiated

*Mar  1 00:00:49.285: %CAPWAP-3-ERRORLOG: Selected MWAR 'LACWLC1'(index 0).

*Mar  1 00:00:49.285: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Jul  9 21:22:47.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.101.225 peer_port: 5246

*Jul  9 21:22:47.002: %CAPWAP-5-CHANGED: CAPWAP changed state to

*Jul  9 21:22:48.863: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.101.225 peer_port: 5246

*Jul  9 21:22:48.865: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.101.225

*Jul  9 21:22:48.865: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN

*Jul  9 21:22:48.869: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.16.101.225

*Jul  9 21:22:48.869: %DTLS-5-PEER_DISCONNECT: Peer 172.16.101.225 has closed connection.

*Jul  9 21:22:48.869: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.16.101.225:5246

*Jul  9 21:22:48.871: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Jul  9 21:22:44.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 21:22:44.002: %CAPWAP-5-CHANGED: CAPWAP changed state to

*Jul  9 21:22:45.817: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 21:22:45.819: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.101.222

*Jul  9 21:22:45.819: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN

*Jul  9 21:22:46.645: %CAPWAP-5-CHANGED: CAPWAP changed state to CFG

*Jul  9 21:22:49.990: %CAPWAP-5-CHANGED: CAPWAP changed state to UP

*Jul  9 21:22:50.293: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller LACWLC2

*Jul  9 21:22:50.590: %LWAPP-3-CLIENTEVENTLOG: SSID LACIT added to the slot[0]

*Jul  9 21:22:50.594: %LWAPP-3-CLIENTEVENTLOG: SSID lacwifi added to the slot[0]

*Jul  9 21:22:50.598: %LWAPP-3-CLIENTEVENTLOG: SSID lacwipv added to the slot[0]

*Jul  9 21:22:50.601: %LWAPP-3-CLIENTEVENTLOG: SSID lacguest added to the slot[0]

*Jul  9 21:22:50.603: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down

*Jul  9 21:22:50.604: %LWAPP-3-CLIENTEVENTLOG: SSID lacmedia added to the slot[0]

*Jul  9 21:22:50.607: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Jul  9 21:22:50.624: %WIDS-6-ENABLED: IDS Signature is loaded and enabled

*Jul  9 21:22:50.948: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Jul  9 21:24:59.636: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.16.101.222:5246

*Jul  9 21:24:59.938: %WIDS-6-DISABLED: IDS Signature is removed and disabled.

*Jul  9 21:24:59.940: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY

*Jul  9 21:24:59.940: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY

*Jul  9 21:24:59.941: bsnInitRcbSlot: slot 1 has NO radio

*Jul  9 21:25:00.125: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down

*Jul  9 21:25:00.549: %LWAPP-3-CLIENTERRORLOG: Primary Discovery Reply: received primary discovery reply when connected to a Primary/Secondary/Tertiary controller

*Jul  9 21:25:00.571:  status of voice_diag_test from WLC is false

*Jul  9 21:25:00.573: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Jul  9 21:25:00.573: %CAPWAP-3-ERRORLOG: Invalid event 2 & state 4 combination.

*Jul  9 21:25:00.573: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 2 state 4.

*Jul  9 21:25:00.573: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller

*Jul  9 21:25:05.868: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY

*Jul  9 21:25:05.868: bsnInitRcbSlot: slot 1 has NO radio

*Jul  9 21:25:06.170: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down

*Jul  9 21:25:06.201:  status of voice_diag_test from WLC is false

*Jul  9 21:25:06.202: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Jul  9 21:25:06.204: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Jul  9 21:25:06.216: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Jul  9 21:25:16.201: %CAPWAP-3-ERRORLOG: Selected MWAR 'LACWLC1'(index 0).

*Jul  9 21:25:16.201: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Jul  9 21:25:09.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.101.225 peer_port: 5246

*Jul  9 21:25:09.002: %CAPWAP-5-CHANGED: CAPWAP changed state to

*Jul  9 21:25:10.879: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.101.225 peer_port: 5246

*Jul  9 21:25:10.880: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.101.225

*Jul  9 21:25:10.881: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN

*Jul  9 21:25:10.884: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.16.101.225

*Jul  9 21:25:10.884: %DTLS-5-PEER_DISCONNECT: Peer 172.16.101.225 has closed connection.

*Jul  9 21:25:10.885: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.16.101.225:5246

*Jul  9 21:25:10.886: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Jul  9 21:25:06.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 21:25:06.003: %CAPWAP-5-CHANGED: CAPWAP changed state to

*Jul  9 21:25:07.821: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.101.222 peer_port: 5246

*Jul  9 21:25:07.822: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.101.222

*Jul  9 21:25:07.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN

*Jul  9 21:25:09.877: %CAPWAP-5-CHANGED: CAPWAP changed state to CFG

*Jul  9 21:25:13.215: %CAPWAP-5-CHANGED: CAPWAP changed state to UP

*Jul  9 21:25:13.513: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller LACWLC2

*Jul  9 21:25:13.804: %LWAPP-3-CLIENTEVENTLOG: SSID LACIT added to the slot[0]

*Jul  9 21:25:13.809: %LWAPP-3-CLIENTEVENTLOG: SSID lacwifi added to the slot[0]

*Jul  9 21:25:13.813: %LWAPP-3-CLIENTEVENTLOG: SSID lacwipv added to the slot[0]

*Jul  9 21:25:13.816: %LWAPP-3-CLIENTEVENTLOG: SSID lacguest added to the slot[0]

*Jul  9 21:25:13.819: %LWAPP-3-CLIENTEVENTLOG: SSID lacmedia added to the slot[0]

*Jul  9 21:25:13.819: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down

*Jul  9 21:25:13.822: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Jul  9 21:25:13.837: %WIDS-6-ENABLED: IDS Signature is loaded and enabled


addtl info:

172.16.101.225 - this is the management ip of the new wlc

172.16.101.221 - this is the management ip of the old wlc

172.16.101.222 - this is the ap-manager interface in the old wlc

172.17.21.4 - this is the dns server


Message was edited by: JP

Amjad Abdullah Mon, 07/09/2012 - 22:51
User Badges:
  • Red, 2250 points or more

interesting part:


on WLC debugs:
*spamApTask7: Jul 09 11:13:17.906: 00:11:5c:9e:76:30 State machine handler: Failed to process  msg type = 3 state = 0 from 10.0.1.162:1245



I have no idea what msg type = 3 means. I think you need eventually to get a TAC case opened because what is going on does not seem to be normal.


on the AP it shows that the AP joined successfully then the radio went to reset mode.

Also:

*Jul  9 21:25:00.573: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up

*Jul  9 21:25:00.573: %CAPWAP-3-ERRORLOG: Invalid event 2 & state 4 combination.


There is invalid event 2! Cisco the only party that can tell what that exactly means.


I would suggest that you try re-convert your AP to lightweight (convert it to autonomous then to lightweight again).

If this did not improve anything try for example to -if possible- make the AP join a controller with 6.x code version if that will work.

If neither works please contact Cisco and get a TAC case opened to handle this strange issue.


Greetings,


Amjad

Actions

This Discussion

Related Content