Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

WLC5508 problem connect AIR-CAP1602I-R-K9

Добрый день,

Точка Air-cap1602 не может подключиться к контроллеру,

В чем может быть проблема?

Спасибо.

AP885a.92bb.97ab#sh inventory

NAME: "AP1600", DESCR: "Cisco Aironet 1600 Series (IEEE 802.11n) Access Point"

PID: AIR-CAP1602I-R-K9 , VID: V01, SN: FGL1744W6WG

AP885a.92bb.97ab# sh version

Cisco IOS Software, C1600 Software (AP1G2-K9W8-M), Version 15.2(2)JB2, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2013 by Cisco Systems, Inc.

Compiled Mon 29-Jul-13 12:35 by prod_rel_team

ROM: Bootstrap program is C1600 boot loader

BOOTLDR: C1600 Boot Loader (AP1G2-BOOT-M) LoaderVersion 15.2(2)JAX, RELEASE SOFTWARE (fc1)

AP885a.92bb.97ab uptime is 2 hours, 58 minutes

System returned to ROM by power-on

System image file is "flash:/ap1g2-k9w8-mx.152-2.JB2/ap1g2-k9w8-mx.152-2.JB2"

Last reload reason:

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply

third-party authority to import, export, distribute or use encryption.

Importers, exporters, distributors and users are responsible for

compliance with U.S. and local country laws. By using this product you

agree to comply with applicable laws and regulations. If you are unable

to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to

export@cisco.com.

cisco AIR-CAP1602I-R-K9    (PowerPC) processor (revision B0) with 98294K/32768K bytes of memory.

Processor board ID FGL1744W6WG

PowerPC CPU at 533Mhz, revision number 0x2151

Last reset from power-on

LWAPP image version 7.4.110.0

1 Gigabit Ethernet interface

2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.

Base ethernet MAC Address: 88:5A:92:BB:97:AB

Part Number                          : 73-14671-04

PCA Assembly Number                  : 000-00000-00

PCA Revision Number                  :

PCB Serial Number                    : FOC17432XWL

Top Assembly Part Number             : 800-38552-01

Top Assembly Serial Number           : FGL1744W6WG

Top Revision Number                  : A0

Product/Model Number                 : AIR-CAP1602I-R-K9

Configuration register is 0xF

(Cisco Controller) >show inventory

Burned-in MAC Address............................ C0:67:AF:1A:CF:A0

Power Supply 1................................... Present, OK

Power Supply 2................................... Present, OK

Maximum number of APs supported.................. 12

NAME: "Chassis"    , DESCR: "Cisco 5500 Series Wireless LAN Controller"

PID: AIR-CT5508-K9,  VID: V03,  SN: FCW1748L07P

(Cisco Controller) >show inventory

Burned-in MAC Address............................ C0:67:AF:1A:CF:A0

Power Supply 1................................... Present, OK

Power Supply 2................................... Present, OK

Maximum number of APs supported.................. 12

NAME: "Chassis"    , DESCR: "Cisco 5500 Series Wireless LAN Controller"

PID: AIR-CT5508-K9,  VID: V03,  SN: FCW1748L07P

(Cisco Controller) >

(Cisco Controller) >

(Cisco Controller) >

(Cisco Controller) >show sysinfo

Manufacturer's Name.............................. Cisco Systems Inc.

Product Name..................................... Cisco Controller

Product Version.................................. 7.4.110.0

Bootloader Version............................... 1.0.1

Field Recovery Image Version..................... 6.0.182.0

Firmware Version................................. FPGA 1.7, Env 1.8, USB console 2.2

Build Type....................................... DATA + WPS + LDPE

System Name...................................... CISCO-CAPWAP-CONTROLLER

System Location..................................

System Contact...................................

System ObjectID.................................. 1.3.6.1.4.1.9.1.1069

Redundancy Mode.................................. Disabled

IP Address....................................... 10.1.0.66

Last Reset....................................... Software reset

System Up Time................................... 0 days 23 hrs 37 mins 52 secs

System Timezone Location.........................

System Stats Realtime Interval................... 5

System Stats Normal Interval..................... 180

Configured Country............................... US  - United States

Operating Environment............................ Commercial (0 to 40 C)

--More-- or (q)uit

Internal Temp Alarm Limits....................... 0 to 65 C

Internal Temperature............................. +42 C

External Temperature............................. +22 C

Fan Status....................................... OK

State of 802.11b Network......................... Enabled

State of 802.11a Network......................... Disabled

Number of WLANs.................................. 1

Number of Active Clients......................... 0

Memory Current Usage............................. Unknown

Memory Average Usage............................. Unknown

CPU Current Usage................................ Unknown

CPU Average Usage................................ Unknown

Burned-in MAC Address............................ C0:67:AF:1A:CF:A0

Power Supply 1................................... Present, OK

Power Supply 2................................... Present, OK

Maximum number of APs supported.................. 12

(Cisco Controller) >*spamApTask7: Jan 30 16:43:11.448: 64:e9:50:af:66:70 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.103.24.11:47484)since DTLS session is not established

*spamApTask6: Jan 30 16:43:11.556: 64:e9:50:af:66:70 Discovery Request from 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:11.556: 64:e9:50:af:66:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =0

*spamApTask6: Jan 30 16:43:11.557: 64:e9:50:af:66:70 Discovery Response sent to 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:11.557: 64:e9:50:af:66:70 Discovery Response sent to 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:21.552: 64:e9:50:af:66:70 DTLS connection not found, creating new connection for 10:103:24:11 (47483) 10:1:0:66 (5246)

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: called to get cert for CID 1301e815

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetSshPrivateKeyFromCID: called to get key for CID 1301e815

*spamApTask6: Jan 30 16:43:21.553: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.553: sshpmGetSshPrivateKeyFromCID: match in row 2

*spamApTask6: Jan 30 16:43:21.879: sshpmGetIssuerHandles: locking ca cert table

*spamApTask6: Jan 30 16:43:21.879: sshpmGetIssuerHandles: calling x509_alloc() for user cert

*spamApTask6: Jan 30 16:43:21.879: sshpmGetIssuerHandles: calling x509_decode()

*spamApTask6: Jan 30 16:43:21.883: sshpmGetIssuerHandles: <subject> C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP1G2-885a92bb97ab, MAILTO=support@cisco.com

*spamApTask6: Jan 30 16:43:21.883: sshpmGetIssuerHandles: <issuer>  O=Cisco Systems, CN=Cisco Manufacturing CA

*spamApTask6: Jan 30 16:43:21.883: sshpmGetIssuerHandles: Mac Address in subject is 88:5a:92:bb:97:ab

*spamApTask6: Jan 30 16:43:21.883: sshpmGetIssuerHandles: Cert Name in subject is AP1G2-885a92bb97ab

*spamApTask6: Jan 30 16:43:21.883: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.

*spamApTask6: Jan 30 16:43:21.883: sshpmGetCID: called to evaluate <cscoDefaultMfgCaCert>

*spamApTask6: Jan 30 16:43:21.883: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.883: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: called to get cert for CID 2b59913d

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.884: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.884: ssphmUserCertVerify: calling x509_decode()

*spamApTask6: Jan 30 16:43:21.894: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetIssuerHandles: ValidityString (current): 2014/01/30/16:43:21

*spamApTask6: Jan 30 16:43:21.894: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/10/29/01:36:25

*spamApTask6: Jan 30 16:43:21.894: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/10/29/01:46:25

*spamApTask6: Jan 30 16:43:21.894: sshpmGetIssuerHandles: getting cisco ID cert handle...

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: called to evaluate <cscoDefaultIdCert>

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.894: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask6: Jan 30 16:43:21.902: sshpmFreePublicKeyHandle: called with 0x2c20d0e4

*spamApTask6: Jan 30 16:43:21.902: sshpmFreePublicKeyHandle: freeing public key

*spamApTask6: Jan 30 16:43:22.089: 64:e9:50:af:66:70 Allocated index from main list, Index: 441

*spamApTask6: Jan 30 16:43:22.089: 64:e9:50:af:66:70 DTLS keys for Control Plane are plumbed successfully for AP 10.103.24.11. Index 442

*spamApTask6: Jan 30 16:43:22.089: 64:e9:50:af:66:70 DTLS Session established server (10.1.0.66:5246), client (10.103.24.11:47483)

*spamApTask6: Jan 30 16:43:22.089: 64:e9:50:af:66:70 Starting wait join timer for AP: 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:22.091: 64:e9:50:af:66:70 Join Request from 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:22.092: 64:e9:50:af:66:70 Deleting AP entry 10.103.24.11:47483 from temporary database.

*spamApTask6: Jan 30 16:43:22.092: 64:e9:50:af:66:70 Join Version: = 117730816

*spamApTask6: Jan 30 16:43:22.093: 64:e9:50:af:66:70 Join resp: CAPWAP Maximum Msg element len = 100

*spamApTask6: Jan 30 16:43:22.093: 64:e9:50:af:66:70 Join Response sent to 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:22.093: 64:e9:50:af:66:70 CAPWAP State: Join

*spamApTask6: Jan 30 16:43:22.093: 64:e9:50:af:66:70 capwap_ac_platform.c:1225 - Operation State 0 ===> 4

*apfReceiveTask: Jan 30 16:43:22.094: 64:e9:50:af:66:70 Register LWAPP event for AP 64:e9:50:af:66:70 slot 0

*apfReceiveTask: Jan 30 16:43:22.095: 64:e9:50:af:66:70 Register LWAPP event for AP 64:e9:50:af:66:70 slot 1

*spamApTask6: Jan 30 16:43:22.226: 64:e9:50:af:66:70 Configuration Status from 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:22.226: 64:e9:50:af:66:70 CAPWAP State: Configure

*spamApTask6: Jan 30 16:43:22.226: 64:e9:50:af:66:70 Updating IP info for AP 64:e9:50:af:66:70 -- static 1, 10.1.0.67/255.255.255.0, gtw 10.1.0.128

*spamApTask6: Jan 30 16:43:22.227: 64:e9:50:af:66:70 Configured Static IP Address not valid for AP 64:e9:50:af:66:70

*spamApTask6: Jan 30 16:43:22.227: 64:e9:50:af:66:70 Updated IP Domain info for AP 64:e9:50:af:66:70 -- set 0, Domain

*spamApTask6: Jan 30 16:43:22.227: 64:e9:50:af:66:70 Updating IP NamServer info for AP 64:e9:50:af:66:70 -- set 0, nameserver 0.0.0.0

*spamApTask6: Jan 30 16:43:22.227: 64:e9:50:af:66:70 AP 64:e9:50:af:66:70: Invalid country code ().

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 PHY_TX_POWER_PAYLOAD: Invalid Tx Power Level 0

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Channel 13 is invalid in the domain

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 AP 64:e9:50:af:66:70: Invalid country code ().

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 PHY_TX_POWER_PAYLOAD: Invalid Tx Power Level 0

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Channel 161 is invalid in the domain

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Setting MTU to 1485

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 AP 64:e9:50:af:66:70: Invalid country code ().

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Regulatory Domain Mismatch: AP 64:e9:50:af:66:70 not allowed to join. Regulatory Domain check failed.

                                                                                                                                                          Allow

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Finding DTLS connection to delete for AP (10:103:24:11/47483)

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 Disconnecting DTLS Capwap-Ctrl session 0x1702d4a0 for AP (10:103:24:11/47483)

*spamApTask6: Jan 30 16:43:22.228: 64:e9:50:af:66:70 CAPWAP State: Dtls tear down

*spamApTask6: Jan 30 16:43:22.229: 64:e9:50:af:66:70 DTLS keys for Control Plane deleted successfully for AP 10.103.24.11

*spamApTask6: Jan 30 16:43:22.236: 64:e9:50:af:66:70 Failed post decode processing of config status from 10.103.24.11:47483

*spamApTask6: Jan 30 16:43:22.236: 64:e9:50:af:66:70 State machine handler: Failed to process  msg type = 5 state = 5 from 10.103.24.11:47483

AP885a.92bb.97ab#

*Jan 30 17:00:47.163: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up

*Jan 30 17:00:53.087: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Jan 30 17:00:53.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.1.0.66 peer_port: 5246

*Jan 30 17:00:53.539: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.1.0.66 peer_port: 5246

*Jan 30 17:00:53.539: %CAPWAP-5-SENDJOIN: sending Join Request to 10.1.0.66

*Jan 30 17:00:53.539: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.

*Jan 30 17:00:53.539: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.

*Jan 30 17:00:53.539: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller

*Jan 30 17:00:53.539: %CAPWAP-3-ERRORLOG: Failed to process encrypted capwap packet from 10.1.0.66

., 1)30 17:01:11.671: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(UNKNOWN_MESSAGE_TYPE (5)

*Jan 30 17:01:11.671: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE

*Jan 30 17:01:11.671: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.1.0.66:5246

*Jan 30 17:01:11.715: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255

*Jan 30 17:01:11.735: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down

*Jan 30 17:01:11.735: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down

*Jan 30 17:01:11.747: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up

*Jan 30 17:01:11.779: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up

*Jan 30 17:01:12.735: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

*Jan 30 17:01:12.783: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down

*Jan 30 17:01:12.791: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset

*Jan 30 17:01:13.775: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up

*Jan 30 17:01:13.783: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down

*Jan 30 17:01:13.811: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up

*Jan 30 17:01:13.819: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down

*Jan 30 17:01:13.827: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset

*Jan 30 17:01:14.811: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up

*Jan 30 17:01:14.819: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

*Jan 30 17:01:14.855: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up

*Jan 30 17:01:15.855: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up

1 ACCEPTED SOLUTION

Accepted Solutions
VIP Purple

Re: WLC5508 problem connect AIR-CAP1602I-R-K9

If you are in Russia then change the country cod eon WLC.

Here is the procedue:

Change the country code on WLC.

GUI:

Disable both Network first

Choose Wireless > 802.11a/n > Network, Unselect the 802.11a Network Status check box.,Click Apply

Choose Wireless > 802.11b/g/n > Network.,Unselect the 802.11b/g Network Status check box.,Click Apply

Then

Wireless > Country and there you can change the county to Russian.

After changing the Country you must enable both networks again.

CLI:

Change the country code of a WLC, you must disable the 802.11a and 802.11b network :

>config 802.11a disable network

>config 802.11b disable network

Now you can change the country code of the controller. For example, we change it from US to Mexico

>config country RU

After changing the country,enable the 802.11 interfaces.

>config 802.11a enable network

>config 802.11b enable network

Regards

Dont forget to rate helpful posts

4 REPLIES
VIP Purple

Re: WLC5508 problem connect AIR-CAP1602I-R-K9

HI ,

PID: AIR-CAP1602I-R-K9 , VID: V01, SN: FGL1744W6WG

(Cisco Controller) >show sysinfo

Manufacturer's Name.............................. Cisco Systems Inc.

Product Name..................................... Cisco Controller

Product Version.................................. 7.4.110.0

Bootloader Version............................... 1.0.1

Field Recovery Image Version..................... 6.0.182.0

Firmware Version................................. FPGA 1.7, Env 1.8, USB console 2.2

Build Type....................................... DATA + WPS + LDPE

System Name...................................... CISCO-CAPWAP-CONTROLLER

System Location..................................

System Contact...................................

System ObjectID.................................. 1.3.6.1.4.1.9.1.1069

Redundancy Mode.................................. Disabled

IP Address....................................... 10.1.0.66

Last Reset....................................... Software reset

System Up Time................................... 0 days 23 hrs 37 mins 52 secs

System Timezone Location.........................

System Stats Realtime Interval................... 5

System Stats Normal Interval..................... 180

Configured Country............................... US  - United States

you ahve a wrong regulatery domain on AP.

If you are in USA then the access point should be  AIR-CAP1602I-A-K9

Which country are you in ??

Regards

New Member

WLC5508 problem connect AIR-CAP1602I-R-K9

Hello, sandeepchoudhary21

My country Russia.

VIP Purple

Re: WLC5508 problem connect AIR-CAP1602I-R-K9

If you are in Russia then change the country cod eon WLC.

Here is the procedue:

Change the country code on WLC.

GUI:

Disable both Network first

Choose Wireless > 802.11a/n > Network, Unselect the 802.11a Network Status check box.,Click Apply

Choose Wireless > 802.11b/g/n > Network.,Unselect the 802.11b/g Network Status check box.,Click Apply

Then

Wireless > Country and there you can change the county to Russian.

After changing the Country you must enable both networks again.

CLI:

Change the country code of a WLC, you must disable the 802.11a and 802.11b network :

>config 802.11a disable network

>config 802.11b disable network

Now you can change the country code of the controller. For example, we change it from US to Mexico

>config country RU

After changing the country,enable the 802.11 interfaces.

>config 802.11a enable network

>config 802.11b enable network

Regards

Dont forget to rate helpful posts

New Member

Re: WLC5508 problem connect AIR-CAP1602I-R-K9

Thank you,

It works!

287
Views
0
Helpful
4
Replies