Guest

Preview Tool

Cisco Bug: CSCvs08203 - TLV_CLIENT_CONTEXT_IP_MAC_PAYLOAD is distributed to AP whose mode was changed from FC to Local.

Last Modified

Jun 02, 2020

Products (1)

  • Cisco 5500 Series Wireless Controllers

Known Affected Releases

8.10(204.123)

Description (partial)

Symptom:
Set up Details:
	Build	:8.10.204.123 
	AP 		: 3 APs (1832 - 1Nos, 9115AXE - 1Nos, 2802 - 1Nos) All APs in Flex Connect Mode and on different VLANs.
	WLC 	: WLC5520 in HA mode.
	WLAN	: Open Auth with DHCP assigment required Enabled and Local Switching enabled
	Client 	: Mac Mini running on Win10 OS.

Steps Followed:
1. All 3 APs in same AP group and Flex Group. Hence, radiating same WLAN
2. Changed AP1832 to Local mode.
3. Connect client to AP1832. (No distribution to the FC APs)
4. Roam the client to AP2802, Client IP context is updated on both APs (Local and FC)
5. Roam the client to AP9115, Client IP context is again updated in Local AP.

Observation:
1. Client IP context is getting distributed to the AP whose mode was changed from FC to Local.

Expected Behaviour
1. Client IP context should not be distributed to the Local AP.

Log Prints:

 1. Client connect to local AP (Client IP : 9.10.32.133 )
	Prints on Local AP 
		AP1832_2990#
		AP1832_2990#
		AP1832_2990#
		AP1832_2990#
		AP1832_2990#show dot11 clients

		Total dot11 clients: 1
			   Client MAC Slot ID WLAN ID AID    WLAN Name RSSI     Maxrate WGB
		DC:A4:CA:E9:BA:0B       1       1   1 OPEN_JD_5520  -25 VHT-MCS82SS  No

		AP1832_2990#show flexconnect status
		AP is not in flexconnect mode or flex+bridge mode
		AP1832_2990#devshell
		EXITING CISCO SHELL. PLEASE EXECUTE EXIT IN DEVSHELL TO GET BACK TO CISCO SHELL.



		BusyBox v1.29.3 () built-in shell (ash)

		AP1832_2990:/# cat /click/client_ip_table/dump_ip_mac_table
					  MAC            SRC_AP          IP                       IPv6
		DC:A4:CA:E9:BA:0B 00:B0:E1:9D:0C:A0 9.10.33.104 fe80::4018:9a5c:cbef:c866
		AP1832_2990:/#

	Prints on FC AP1
			AP2802_9086#show flexconnect status

			Flexconnect Status:
				AP in Connected Mode

			AP2802_9086#devshell
			EXITING CISCO SHELL. PLEASE EXECUTE EXIT IN DEVSHELL TO GET BACK TO CISCO SHELL.



			BusyBox v1.29.3 () built-in shell (ash)

			AP2802_9086:/# cat /click/client_ip_table/dump_ip_mac_table
						  MAC            SRC_AP          IP IPv6
			DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104
			AP2802_9086:/# exit
			AP2802_9086#show dot11
			  clients  Show dot11 Client Information
			  qos      Show dot11 qos parameters
			  sensor   Show Sensor Information
			  slot     Slot specific info
			  wlan     Show WLAN/VAP information
			AP2802_9086#show dot11 clients

			Total dot11 clients: 0

			AP2802_9086#devshell
			EXITING CISCO SHELL. PLEASE EXECUTE EXIT IN DEVSHELL TO GET BACK TO CISCO SHELL.



			BusyBox v1.29.3 () built-in shell (ash)

			AP2802_9086:/# cat /click/client_ip_table/dump_ip_mac_table
						  MAC            SRC_AP          IP IPv6
			DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104
			AP2802_9086:/#

	
	Prints on FC AP2
			AP9115AXE_9628#show flexconnect status

			Flexconnect Status:
				AP in Connected Mode

			AP9115AXE_9628#show dot11 clients

			Total dot11 clients: 0

			AP9115AXE_9628#devshell
			EXITING CISCO SHELL. PLEASE EXECUTE EXIT IN DEVSHELL TO GET BACK TO CISCO SHELL.



			BusyBox v1.29.3 () built-in shell (ash)

			Welcome to Cisco.

			Usage of this device is governed by Cisco's End User License Agreement,
			available at:
			http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
			AP9115AXE_9628:/# cat /click/client_ip_table/dump_ip_mac_table
						  MAC            SRC_AP          IP                       IPv6
			DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104 fe80::4018:9a5c:cbef:c866
			AP9115AXE_9628:/#

	
 2. Client roam from local AP to FC AP (Client IP : 9.10.33.104)
	Prints on Local AP 
	AP1832_2990:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP                       IPv6
	DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104 fe80::4018:9a5c:cbef:c866
	AP1832_2990:/#


	Prints on FC AP1
	AP2802_9086:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP IPv6
	DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104
	AP2802_9086:/#

	Prints on FC AP2
	AP9115AXE_9628:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP                       IPv6
	DC:A4:CA:E9:BA:0B 08:EC:F5:F9:C1:00 9.10.33.104 fe80::4018:9a5c:cbef:c866
	AP9115AXE_9628:/#
	
 3. Client roam from FC AP1 to FC AP2 (Client IP : 9.10.35.102)
	Prints on Local AP 
	AP1832_2990:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP                       IPv6
	DC:A4:CA:E9:BA:0B 00:EE:AB:18:BC:C0 9.10.35.102 fe80::4018:9a5c:cbef:c866
	AP1832_2990:/#
	
	Prints on FC AP1
	AP2802_9086:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP                       IPv6
	DC:A4:CA:E9:BA:0B 00:EE:AB:18:BC:C0 9.10.35.102 fe80::4018:9a5c:cbef:c866
	AP2802_9086:/#

	Prints on FC AP2
	AP9115AXE_9628:/# cat /click/client_ip_table/dump_ip_mac_table
				  MAC            SRC_AP          IP IPv6
	DC:A4:CA:E9:BA:0B 00:EE:AB:18:BC:C0 9.10.35.102
	AP9115AXE_9628:/#

	Debug Prints on Local AP
	[*11/14/2019 01:43:26.8747] << TLV table entries: 7 for TLV_CLIENT_CONTEXT_IP_MAC_PAYLOAD>>
	[*11/14/2019 01:43:26.8747] Entry( 0): level 0 type 2515 size   0 value Nested
	[*11/14/2019 01:43:26.8747] Entry( 1): level 1 type    6 size   1 value Unknown
	[*11/14/2019 01:43:26.8747] Entry( 2): level 1 type    1 size   6 value Unknown
	[*11/14/2019 01:43:26.8747] Entry( 3): level 1 type    2 size   6 value Unknown
	[*11/14/2019 01:43:26.8747] Entry( 4): level 1 type    3 size   4 value Unknown
	[*11/14/2019 01:43:26.8747] Entry( 5): level 1 type    4 size   1 value Unknown
	[*11/14/2019 01:43:26.8747] Entry( 6): level 1 type    5 size  16 value Unknown
	[*11/14/2019 01:43:26.8747]
	[*11/14/2019 01:43:26.8747] << end of the TLV entry table>>
	[*11/14/2019 01:43:26.8747] Received TLV_CLIENT_CONTEXT_IP_MAC_PAYLOAD dc:a4:ca:e9:ba:0b
	[*11/14/2019 01:43:26.8747] [ENC] CAPWAP_CONFIGURATION_UPDATE_RESPONSE(8)
	[*11/14/2019 01:43:26.8747] .Msg Elem Type: CAPWAP_MSGELE_RESULT_CODE(33) Len 8 Total 8

Conditions:
NA
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.