Guest

Preview Tool

Cisco Bug: CSCup47250 - WLC 5508 is dropping its LAP by seeing them as Rogue AP

Last Modified

Oct 29, 2018

Products (1)

  • Cisco 5500 Series Wireless Controllers

Known Affected Releases

7.0(0)FHS(0.2)

Description (partial)

Symptom:
APs being rebooted by WLC. There is no crash file generated.
The WLC is pushing some changes to the Access Points, and then sending a reboot request to the APs.

spamApTask6: Feb 06 17:39:06.318: 0c:68:03:ae:fd:00 apfSpamProcessStateChangeInSpamContext: Down LWAPP event for AP 0c:68:03:ae:fd:00 slot 0
apfReceiveTask: Feb 06 17:39:06.318: 0c:68:03:ae:fd:00 Received LWAPP Down event for AP 0c:68:03:ae:fd:00 slot 0!
spamApTask6: Feb 06 17:39:06.319: 0c:68:03:ae:fd:00 apfSpamProcessStateChangeInSpamContext: Down LWAPP event for AP 0c:68:03:ae:fd:00 slot 1
apfReceiveTask: Feb 06 17:39:06.319: 0c:68:03:ae:fd:00 Received LWAPP Down event for AP 0c:68:03:ae:fd:00 slot 1!
*spamApTask6: Feb 06 17:39:06.321: 0c:68:03:ae:fd:00 Echo Timer Expiry: Did not receive heartbeat reply from AP 0c:68:03:ae:fd:00 (172:28:45:20/8442)
*spamApTask6: Feb 06 17:39:06.321: 0c:68:03:ae:fd:00 Finding DTLS connection to delete for AP (172:28:45:20/8442)
*spamApTask6: Feb 06 17:39:06.321: 0c:68:03:ae:fd:00 Disconnecting DTLS Capwap-Ctrl session 0x1707a010 for AP (172:28:45:20/8442)


the CAPWAP debug showns this.

*spamApTask2: Jun 18 13:22:19.547: d0:c7:89:66:09:d0 Echo Timer Expiry: Did not receive heartbeat reply from AP d0:c7:89:66:09:d0 (172:28:42:135/13915)
*spamApTask2: Jun 18 13:22:19.547: d0:c7:89:66:09:d0 Finding DTLS connection to delete for AP (172:28:42:135/13915)
*spamApTask2: Jun 18 13:22:19.547: d0:c7:89:66:09:d0 Disconnecting DTLS Capwap-Ctrl session 0x1702e9e0 for AP (172:28:42:135/13915)

*spamApTask2: Jun 18 13:22:19.547: d0:c7:89:66:09:d0 CAPWAP State: Dtls tear down

*spamApTask2: Jun 18 13:22:19.548: d0:c7:89:66:09:d0 DTLS keys for Control Plane deleted successfully for AP 172.28.42.135

*spamApTask2: Jun 18 13:22:19.556: d0:c7:89:66:09:d0 DTLS connection closed event receivedserver (137:28:5:215/5246) client (172:28:42:135/13915)
*spamApTask2: Jun 18 13:22:19.556: d0:c7:89:66:09:d0 Entry exists for AP (172:28:42:135/13915)
*spamApTask2: Jun 18 13:22:19.557: d0:c7:89:66:09:d0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP d0:c7:89:66:09:d0 slot 0
*apfReceiveTask: Jun 18 13:22:19.557: d0:c7:89:66:09:d0 Deregister LWAPP event for AP d0:c7:89:66:09:d0 slot 0
*spamApTask2: Jun 18 13:22:19.557: d0:c7:89:66:09:d0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP d0:c7:89:66:09:d0 slot 1
*apfReceiveTask: Jun 18 13:22:19.557: d0:c7:89:66:09:d0 Deregister LWAPP event for AP d0:c7:89:66:09:d0 slot 1
*spamApTask2: Jun 18 13:22:19.558: d0:c7:89:66:09:d0 No AP entry exist in temporary database for 172.28.42.135:13915 
*spamApTask3: Jun 18 13:22:19.600: 08:cc:68:90:d9:d0 WTP Event Request from 172.28.44.95:20412

Conditions:
AP Rogue containment.
Both radios enabled and static configured.
The issue was affecting 7.4.111.3. And after an upgrade to 7.4.121.0 the problem persisted
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.