Wireless Access

Reply
Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

installing iap 225 and iap 105 to controller 7210

Hi,

 

İ have one Aruba 7210(license installed for aps) and several iap 225 and 105, i cant be able to go furter.

i placed controller and ap in same vlan and setup dhcp on controller, when i switch the ap it got ip address from controller but cant see it int the controller ap list, after than i convert it to controller from IAP gui no luck, here is the outline from iap 105 console while this operation happening. Please help

 

APBoot 1.4.0.3 (build 37726)
Built: 2013-03-21 at 20:13:41

Model: AP-10x
CPU:   AR7161 revision: A2
Clock: 680 MHz, DDR clock: 340 MHz, Bus clock: 170 MHz
DRAM:  128 MB
POST1: passed
Copy:  done
Flash: 16 MB
PCI:   scanning bus 0 ...
       dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
       00  00  168c  0029 00002   01 10000000 00000000 00000000 00000000
       01  00  168c  0029 00002   01 10010000 00000000 00000000 00000000
Net:   eth0
Radio: ar922x#0, ar922x#1

Hit <Enter> to stop autoboot:  0
Booting OS partition 0
Checking image @ 0xbf100000

Image is signed; verifying checksum... passed
Signer Cert OK
Policy Cert OK
RSA signature verified.
ELF file is 32 bit
Loading .text @ 0x80e00000 (4713832 bytes)
Loading .data @ 0x8127ed70 (32 bytes)
Clearing .bss @ 0x8127ed90 (16 bytes)
## Starting application at 0x80e00000 ...
Uncompressing............................................

Aruba Networks
ArubaOS Version 6.4.2.3 (build 47524 / label #47524)
Built by p4build@minorca.arubanetworks.com on 2014-12-06 at 08:48:39 PST (gcc version 4.3.3)
CPU Rev: aa
71x CPU
Flash variant: default
Cache parity protection disabled
Using 340.000 MHz high precision timer. cycles_per_jiffy=680000
Memory: 121984k/131072k available (1698k kernel code, 8932k reserved, 674k data, 3956k init, 0k highmem)
 available.
detected lzma initramfs
initramfs: LZMA lc=3,lp=0,pb=2,dictSize=8388608,origSize=19246592
LZMA initramfs by Ming-Ching Tiew <mctiew@yahoo.com> ...............................................................                                                                                                                          ....................................................................................................................                                                                                                                          ...................................................................................................................
AR7100 GPIOC major 0
wdt: registered with refresh
Enabling Watchdog
Talisker RSSI LED initialization
Creating 1 MTD partitions on "ar7100-nor0":
0x00000000-0x01000000 : "flash"
i2c /dev entries driver
i2c-talisker: using default base 0x18040000
AD7416 driver probing for devices on AR7100 I2C
.<6>lo: Disabled Privacy Extensions
IPv6 over IPv4 tunneling driver

Starting Kernel SHA1 KAT ...Completed Kernel SHA1 KAT
Starting Kernel HMAC-SHA1 KAT ...Completed Kernel HMAC-SHA1 KAT
Starting Kernel DES KAT ...Completed Kernel DES KAT
Starting Kernel AES KAT ...Completed Kernel AES KAT

Starting Kernel AESGCM KAT ...Completed Kernel AESGCM KAT

Domain Name: arubanetworks.com
No panic info available
Testing TPM... Passed
ag7100_mod: module license 'unspecified' taints kernel.
AG7100: Length per segment 512
AG7100: Max segments per packet 4
AG7100: Max tx descriptor count    400
AG7100: Max rx descriptor count    252
AG7100: fifo cfg 3 018001ff
AG7100CHH: Mac address for unit 0
AG7100CHH: 9c:1c:12:c9:08:9b
ATHRF1: Port 0, Neg Success
ATHRF1: unit 0 phy addr 0 ATHRF1: reg0 0
AP xml model 39, num_radios 2 (jiffies 5706)
init_asap_mod: installation:0
radio 0: band 1 ant 0 max_ssid 8
radio 1: band 0 ant 0 max_ssid 8
Starting watchdog process...
Getting an IP address...
ag7100_ring_alloc Allocated 4800 at 0x80352000
ag7100_ring_alloc Allocated 3024 at 0x8663b000
AG7100: cfg1 0xf cfg2 0x7014
ATHRF1: Port 0, Neg Success
ATHRF1: unit 0 phy addr 0 ATHRF1: reg0 3100
AG7100: unit 0 phy is up...RGMii 1000Mbps full duplex
AG7100: pll reg 0x18050010: 0x110000  AG7100: cfg_1: 0x1ff0000
AG7100: cfg_2: 0x3ff
AG7100: cfg_3: 0x18001ff
AG7100: cfg_4: 0xffff
AG7100: cfg_5: 0xfffef
AG7100: done cfg2 0x7215 ifctl 0x0 miictrl 0x22
Writing 4
10.100.9.4 255.255.255.0 10.100.9.1
Running ADP...Done. Master is 10.100.9.2
ath_hal: 0.9.17.1 (AR5416, AR9380, REGOPS_FUNC, PRIVATE_DIAG, WRITE_EEPROM, 11D)
ath_rate_atheros: Copyright (c) 2001-2005 Atheros Communications, Inc, All Rights Reserved
ath_rate_atheros: Aruba Networks Rate Control Algorithm
ath_dfs: Version 2.0.0
Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved
ath_spectrum: Version 2.0.0
Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved
ath_dev: Copyright (c) 2001-2007 Atheros Communications, Inc, All Rights Reserved
ath_pci: 0.9.4.5 (Atheros/multi-bss)
ath_attach: scn 87d80280 sc 87da0000 ah 87dc0000
wifi0: Base BSSID 9c:1c:12:10:89:b8, 8 available BSSID(s)
bond0 address=9c:1c:12:c9:08:9b
br0 address=9c:1c:12:c9:08:9b
wifi0: AP type AP-105, radio 0, max_bssids 8
wifi0: Atheros 9280: mem=0x10010000, irq=49 hw_base=0xb0010000
ath_attach: scn 86060280 sc 86080000 ah 860c0000
wifi1: Base BSSID 9c:1c:12:10:89:b0, 8 available BSSID(s)
bond0 address=9c:1c:12:c9:08:9b
br0 address=9c:1c:12:c9:08:9b
wifi1: AP type AP-105, radio 1, max_bssids 8
wifi1: Atheros 9280: mem=0x10000000, irq=48 hw_base=0xb0000000
ath_ahb: 0.9.4.5 (Atheros/multi-bss)

Starting FIPS KAT ... Completed FIPS KAT

AP rebooted Fri Dec 31 16:04:45 PST 1999; SAPD: Unable to contact switch: HELLO-TIMEOUT. Last Ctrl msg: HELLO len=11                                                                                                                          86 dest=10.100.9.2 tries=10 seq=0
shutting down watchdog process (nanny will restart it)...

        <<<<<       Welcome to the Access Point     >>>>>

~ #
~ #
~ # ping 10.100.9.2
PING 10.100.9.2 (10.100.9.2): 56 data bytes
64 bytes from 10.100.9.2: icmp_seq=0 ttl=64 time=0.6 ms
64 bytes from 10.100.9.2: icmp_seq=1 ttl=64 time=0.5 ms
64 bytes from 10.100.9.2: icmp_seq=2 ttl=64 time=0.4 ms
64 bytes from 10.100.9.2: icmp_seq=3 ttl=64 time=0.5 ms
64 bytes from 10.100.9.2: icmp_seq=4 ttl=64 time=0.4 ms

Aruba
Posts: 1,643
Registered: ‎04-13-2009

Re: installing iap 225 and iap 105 to controller 7210

[ Edited ]

Can you share the output of the system log from the controller?  It should give some indication as to what is going on.

 

Check to see if you have Control Plane Security enabled and whether you have Auto Cert Provisioning enabled. 

 

Also, make sure your IAPs are of the same regulatory domain as your controller; for example, rest of world vs. -US model.

 

------------------------------------------------
Systems Engineer, Northeast USA
ACCX | ACDX | ACMX

Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

Re: installing iap 225 and iap 105 to controller 7210

 

Hi Clembo

 

Control Plane Security is Enabled

Auto Cert provisioning  no tick

 

This controller has only two role ,Master and Local i havent see standalone mode inthe gui.

 

Here is the fresh logs for ap and cont,

 

for IAP-225

 


APBoot 1.5.3.4 (build 43264)
Built: 2014-04-16 at 15:38:45

Model: AP-22x
CPU0:  P1020E, Version: 1.1, (0x80ec0011)
Core:  E500, Version: 5.1, (0x80212051)
Clock:
       CPU0: 800 MHz
       CPU1: 800 MHz
       CCB:  400 MHz
       DDR:  333.333 MHz (666.667 MT/s data rate) (Asynchronous)
       LBC:   25 MHz
L1:    D-cache 32KB enabled
       I-cache 32KB enabled
I2C:   ready
DRAM:  Configuring DDR for 666.667 MT/s data rate
DDR:   512 MB (DDR3, 32-bit, CL=5, ECC off)
POST1: memory passed
Flash: 32 MB
L2:    256 KB enabled
Power: 802.3af POE
PCIe1: RC, link up, x1
       dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
       00  00  14e4  43a2 00002   03 80000004 00000000 80200004 00000000
PCIe2: RC, link up, x1
       dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
       00  00  14e4  43a1 00002   03 a0000004 00000000 a0200004 00000000
Net:   eth0, eth1
Radio: bcm43460#0, bcm43460#1

Hit <Enter> to stop autoboot:  0
Booting OS partition 0
Checking image @ 0xee000000
Copying image from 0xee000000

Image is signed; verifying checksum... passed
Signer Cert OK
Policy Cert OK
RSA signature verified.
[    0.000000] Flash variant: default
[    0.000000]
[    0.000000] Aruba Networks
[    0.000000] ArubaOS Version 6.4.2.3 (build 47524 / label #47524)
[    0.000000] Built by p4build@minorca.arubanetworks.com on 2014-12-06 at 08:36:20 PST (gcc version 4.5.1)
[    0.000000]
[    0.000000] Memory: 509688k/524288k available (8952k kernel code, 14600k reserved, 496k data, 454k bss, 5560k init)
[    0.002941] Processor 1 found.
[    0.156852] Brought up 2 CPUs
[    0.233378] PCI: Probing PCI hardware
[    0.276103] PCI: Resetting PCI bus
[    0.477126] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
[    0.539368] pci 0001:02:00.0: PCI bridge to [bus 03-ff]
[    0.601653] pci 0000:01:00.0: BAR 2: assigned [mem 0x80000000-0x801fffff 64bit]
[    0.688632] pci 0000:01:00.0: BAR 2: set to [mem 0x80000000-0x801fffff 64bit] (PCI address [0x80000000-0x801fffff]
[    0.812543] pci 0000:01:00.0: BAR 0: assigned [mem 0x80200000-0x80207fff 64bit]
[    0.900039] pci 0000:01:00.0: BAR 0: set to [mem 0x80200000-0x80207fff 64bit] (PCI address [0x80200000-0x80207fff]
[    1.023993] pci 0000:00:00.0: enabling device (0106 -> 0107)
[    1.091694] pci 0001:03:00.0: BAR 2: assigned [mem 0xa0000000-0xa01fffff 64bit]
[    1.179189] pci 0001:03:00.0: BAR 2: set to [mem 0xa0000000-0xa01fffff 64bit] (PCI address [0xa0000000-0xa01fffff]
[    1.303134] pci 0001:03:00.0: BAR 0: assigned [mem 0xa0200000-0xa0207fff 64bit]
[    1.390632] pci 0001:03:00.0: BAR 0: set to [mem 0xa0200000-0xa0207fff 64bit] (PCI address [0xa0200000-0xa0207fff]
[    1.514584] pci 0001:02:00.0: enabling device (0106 -> 0107)
[    5.467946] Kprobe smoke test started
[    5.543592] Kprobe smoke test passed successfully
[    5.717075] ee000000.nor: Found 1 x16 devices at 0x0 in 16-bit bank
[    5.792121] Amd/Fujitsu Extended Query Table at 0x0040
[    5.853646] number of CFI chips: 1
[    5.898405] fsl-gianfar ethernet.2: enabled errata workarounds, flags: 0x4
[    5.981236] /proc/gfar_eth0_stats created
[    6.031497] fsl-gianfar ethernet.3: enabled errata workarounds, flags: 0x4
[    6.114249] /proc/gfar_eth1_stats created
[    6.178367] Enabling watchdog on CPU 1
[    6.178376] Enabling watchdog on CPU 0
[    6.274754]
[    6.274758] Starting Kernel SHA1 KAT ...Completed Kernel SHA1 KAT
[    6.366529] Starting Kernel HMAC-SHA1 KAT ...Starting Kernel HMAC SHA1 FIPS KAT ...Completed Kernel HMAC SHA1 FIPS KAT
[    6.376116] Starting Kernel HMAC SHA256 FIPS KAT ...Completed Kernel HMAC SHA256 FIPS KAT
[    6.377063] Starting Kernel HMAC SHA384 FIPS KAT ...Completed Kernel HMAC SHA384 FIPS KAT
[    6.377508] Starting Kernel HMAC SHA512 FIPS KAT ...Completed Kernel HMAC SHA512 FIPS KAT
[    6.377921] Starting Kernel AES-CBC FIPS KAT ...Completed Kernel AES-CBC FIPS KAT
[    6.576670] Starting Kernel AES-CCM FIPS KAT ...Completed Kernel AES-CCM FIPS KAT
[    6.577129] Starting Kernel 3DES-CBC FIPS KAT ...Completed Kernel 3DES-CBC FIPS KAT
[    7.070486] Completed Kernel HMAC-SHA1 KAT
[    7.120521] Starting Kernel DES KAT ...Completed Kernel DES KAT
[    7.192469] Starting Kernel AES KAT ...Completed Kernel AES KAT
[    7.236264]
Domain Name: arubanetworks.com
No panic info available
[    8.912569] p1020_soc: P1020 Misc Utils Driver version 1
Ethernet port 1 mode: active-standby
[   24.280128] ADDRCONF(NETDEV_UP): eth0: link is not ready
[   24.346720] ADDRCONF(NETDEV_UP): bond0: link is not ready
[   24.428033] bonding: bond0: enslaving eth0 as a backup interface with a down link.
[   24.535554] bonding: bond0: enslaving eth1 as a backup interface with a down link.
[   24.761726] AP xml model 66, num_radios 2 (jiffies 11730)
[   24.826346] init_asap_mod: installation:0
[   24.874288] radio 0: band 1 ant 0 max_ssid 16
[   24.926392] radio 1: band 0 ant 0 max_ssid 16
[   24.978507] ethernet_device_event: dev eth0 is up
Starting watchdog process...
Getting an IP address...
[   27.979715] PHY: eth0 (mdio@ffe24000:00) - Link is Up - 1000/Full
[   28.347147] bonding: bond0: link status definitely up for interface eth0.
[   28.428450] bonding: bond0: making interface eth0 the new active one.
[   28.505652] bonding: bond0: first active interface up!
[   28.567396] ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
10.100.9.3 255.255.255.0 10.100.9.1
Running ADP...Done. Master is 10.100.9.2
[   34.012229] wl 0000:01:00.0: enabling device (0000 -> 0002)
[   34.105940] wifi0: AP type AP-225, radio 0, max_bssids 16
[   34.449902] Shutting down eth1 due to insufficient POE voltage [power profile 2]
[   34.540465] wl 0001:03:00.0: enabling device (0000 -> 0002)
[   34.633030] wifi1: AP type AP-225, radio 1, max_bssids 16
Clearing P1020 PCIe Error Status
shutting down watchdog process (nanny will restart it)...

        <<<<<       Welcome to the Access Point     >>>>>

~ #
~ #
~

 

 

For Controller 7210

 

Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 13
Feb 12 08:39:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:39:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:39:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:39:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:39:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:39:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:39:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:39:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:39:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:39:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:39:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:39:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:39:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:39:38  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:39:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
Feb 12 08:39:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
Feb 12 08:39:50  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:39:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:39:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:39:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:39:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:39:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:40:05  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:40:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:40:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:40:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:40:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:40:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:40:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:40:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:40:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:40:23  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:40:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:40:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:40:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:40:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:40:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:40:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:40:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:40:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:40:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:40:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:41:05  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8236:5018
Feb 12 08:41:05  cfgm[3447]: <399815> <INFO> |cfgm|  Processing the Mobility Manager State message
Feb 12 08:41:05  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8236:5018
Feb 12 08:41:05  cfgm[3447]: <399815> <INFO> |cfgm|  Processing the Mobility Manager State message
Feb 12 08:41:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:41:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:41:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:41:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:41:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:41:19  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:41:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:41:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:41:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:41:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:41:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:41:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:41:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:41:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:41:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
Feb 12 08:41:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
Feb 12 08:41:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:41:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:41:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:41:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:41:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 13
Feb 12 08:42:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:42:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:42:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:42:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:42:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:42:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:42:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:42:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:42:24  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:42:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:42:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:42:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:42:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:42:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:42:51  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
Feb 12 08:42:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:42:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:42:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:42:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:42:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:43:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:43:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:43:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:43:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:43:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:43:21  sapd[1735]: <311002> <WARN> |AP 94:b4:0f:c0:47:c2@10.100.9.3 sapd|  Rebooting: SAPD: Unable to contact switch: HELLO-TIMEOUT. Last Ctrl msg: HELLO len=1206 dest=10.100.9.2 tries=10 seq=0
Feb 12 08:43:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:43:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:43:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:43:22  nanny[1678]: <303086> <ERRS> |AP 94:b4:0f:c0:47:c2@10.100.9.3 nanny| Process Manager (nanny) shutting down - AP will reboot!
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 11
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 29
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 38
Feb 12 08:43:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
Feb 12 08:43:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
Feb 12 08:43:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
Feb 12 08:43:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
Feb 12 08:43:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
Feb 12 08:43:39  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:39  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:39  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
Feb 12 08:43:39  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 360
Feb 12 08:43:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
Feb 12 08:43:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
Feb 12 08:43:42  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
Feb 12 08:43:42  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
Feb 12 08:43:42  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message

Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

Re: installing iap 225 and iap 105 to controller 7210

Hi,

 

Its ok now, as you said, i disabled the "Control Plane Security" under Controller and discovered the AP, So what is the further configuration?  is there any best practice document?

 

Thanks

Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

Re: installing iap 225 and iap 105 to controller 7210

Now it doesnt find the APs even this setting are disable.

Aruba
Posts: 1,643
Registered: ‎04-13-2009

Re: installing iap 225 and iap 105 to controller 7210

This apparently was your issue from the message below.  

"94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.

 

Control Plane Security is typically turned on, however you need to decide to enable auto-cert provisioning or selectively go in and approve the APs that are trying to connect.     Many customers will enable auto provisioning during a rollout and then perhaps disable once the environment is up and then manually approve ones; while others always leave it enabled.  When you decide what method you want to use, reboot the AP to foce it through the process.   If you want to take it a step further, delete the AP from the Control Plane Security whitelist and reboot the AP to start the process over.   It will take the AP a couple of reboots to go through the Control Plane Security negotiation.  For more details check out the following:

 

http://www.arubanetworks.com/techdocs/ArubaOS_64x_WebHelp/Web_Help_Index.htm#ArubaFrameStyles/Control_Plane/Configuring_Control_Plan.htm

------------------------------------------------
Systems Engineer, Northeast USA
ACCX | ACDX | ACMX

Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

Re: installing iap 225 and iap 105 to controller 7210

Hi,

 

Thanks,

 

convert-aos ap ---- command was not working, i used gui to convert ap, now it is ok.

Occasional Contributor II
Posts: 10
Registered: ‎12-09-2014

Re: installing iap 225 and iap 105 to controller 7210

Hi, there is some solution for that?

 

 I have the same error. Thank you

Occasional Contributor I
Posts: 6
Registered: ‎02-11-2015

Re: installing iap 225 and iap 105 to controller 7210

The issue was ap type, solution is

 

1. first of all create this DNS record in your dns server

aruba-master   ip:x.x.x.x

 

2. Connect to ap from console port and change AP mode.

 

apboot> hit enter in 3 second
AP# clear os 0
AP# clear os 1

 

3. Finally  connect it to network and it will find your controller automatically. Make sure 'Controle Plane Security' is Disabled under Configuration Menu.

 

İ hope it help

Occasional Contributor II
Posts: 10
Registered: ‎12-09-2014

Re: installing iap 225 and iap 105 to controller 7210

Hi Thank you very much for your answer.
When i try connect the Aruba 225 through serial, but i only see a line of rare characters and i can't execute the command that you says.

 

Do yo know similar issue?

 

Thank you very much. Best regards.

Search Airheads
Showing results for 
Search instead for 
Did you mean: