Wireless Access

last person joined: 12 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

installing iap 225 and iap 105 to controller 7210

This thread has been viewed 2 times
  • 1.  installing iap 225 and iap 105 to controller 7210

    Posted Feb 11, 2015 09:39 AM

    Hi,

     

    İ have one Aruba 7210(license installed for aps) and several iap 225 and 105, i cant be able to go furter.

    i placed controller and ap in same vlan and setup dhcp on controller, when i switch the ap it got ip address from controller but cant see it int the controller ap list, after than i convert it to controller from IAP gui no luck, here is the outline from iap 105 console while this operation happening. Please help

     

    APBoot 1.4.0.3 (build 37726)
    Built: 2013-03-21 at 20:13:41

    Model: AP-10x
    CPU:   AR7161 revision: A2
    Clock: 680 MHz, DDR clock: 340 MHz, Bus clock: 170 MHz
    DRAM:  128 MB
    POST1: passed
    Copy:  done
    Flash: 16 MB
    PCI:   scanning bus 0 ...
           dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
           00  00  168c  0029 00002   01 10000000 00000000 00000000 00000000
           01  00  168c  0029 00002   01 10010000 00000000 00000000 00000000
    Net:   eth0
    Radio: ar922x#0, ar922x#1

    Hit <Enter> to stop autoboot:  0
    Booting OS partition 0
    Checking image @ 0xbf100000

    Image is signed; verifying checksum... passed
    Signer Cert OK
    Policy Cert OK
    RSA signature verified.
    ELF file is 32 bit
    Loading .text @ 0x80e00000 (4713832 bytes)
    Loading .data @ 0x8127ed70 (32 bytes)
    Clearing .bss @ 0x8127ed90 (16 bytes)
    ## Starting application at 0x80e00000 ...
    Uncompressing............................................

    Aruba Networks
    ArubaOS Version 6.4.2.3 (build 47524 / label #47524)
    Built by p4build@minorca.arubanetworks.com on 2014-12-06 at 08:48:39 PST (gcc version 4.3.3)
    CPU Rev: aa
    71x CPU
    Flash variant: default
    Cache parity protection disabled
    Using 340.000 MHz high precision timer. cycles_per_jiffy=680000
    Memory: 121984k/131072k available (1698k kernel code, 8932k reserved, 674k data, 3956k init, 0k highmem)
     available.
    detected lzma initramfs
    initramfs: LZMA lc=3,lp=0,pb=2,dictSize=8388608,origSize=19246592
    LZMA initramfs by Ming-Ching Tiew <mctiew@yahoo.com> ...............................................................                                                                                                                          ....................................................................................................................                                                                                                                          ...................................................................................................................
    AR7100 GPIOC major 0
    wdt: registered with refresh
    Enabling Watchdog
    Talisker RSSI LED initialization
    Creating 1 MTD partitions on "ar7100-nor0":
    0x00000000-0x01000000 : "flash"
    i2c /dev entries driver
    i2c-talisker: using default base 0x18040000
    AD7416 driver probing for devices on AR7100 I2C
    .<6>lo: Disabled Privacy Extensions
    IPv6 over IPv4 tunneling driver

    Starting Kernel SHA1 KAT ...Completed Kernel SHA1 KAT
    Starting Kernel HMAC-SHA1 KAT ...Completed Kernel HMAC-SHA1 KAT
    Starting Kernel DES KAT ...Completed Kernel DES KAT
    Starting Kernel AES KAT ...Completed Kernel AES KAT

    Starting Kernel AESGCM KAT ...Completed Kernel AESGCM KAT

    Domain Name: arubanetworks.com
    No panic info available
    Testing TPM... Passed
    ag7100_mod: module license 'unspecified' taints kernel.
    AG7100: Length per segment 512
    AG7100: Max segments per packet 4
    AG7100: Max tx descriptor count    400
    AG7100: Max rx descriptor count    252
    AG7100: fifo cfg 3 018001ff
    AG7100CHH: Mac address for unit 0
    AG7100CHH: 9c:1c:12:c9:08:9b
    ATHRF1: Port 0, Neg Success
    ATHRF1: unit 0 phy addr 0 ATHRF1: reg0 0
    AP xml model 39, num_radios 2 (jiffies 5706)
    init_asap_mod: installation:0
    radio 0: band 1 ant 0 max_ssid 8
    radio 1: band 0 ant 0 max_ssid 8
    Starting watchdog process...
    Getting an IP address...
    ag7100_ring_alloc Allocated 4800 at 0x80352000
    ag7100_ring_alloc Allocated 3024 at 0x8663b000
    AG7100: cfg1 0xf cfg2 0x7014
    ATHRF1: Port 0, Neg Success
    ATHRF1: unit 0 phy addr 0 ATHRF1: reg0 3100
    AG7100: unit 0 phy is up...RGMii 1000Mbps full duplex
    AG7100: pll reg 0x18050010: 0x110000  AG7100: cfg_1: 0x1ff0000
    AG7100: cfg_2: 0x3ff
    AG7100: cfg_3: 0x18001ff
    AG7100: cfg_4: 0xffff
    AG7100: cfg_5: 0xfffef
    AG7100: done cfg2 0x7215 ifctl 0x0 miictrl 0x22
    Writing 4
    10.100.9.4 255.255.255.0 10.100.9.1
    Running ADP...Done. Master is 10.100.9.2
    ath_hal: 0.9.17.1 (AR5416, AR9380, REGOPS_FUNC, PRIVATE_DIAG, WRITE_EEPROM, 11D)
    ath_rate_atheros: Copyright (c) 2001-2005 Atheros Communications, Inc, All Rights Reserved
    ath_rate_atheros: Aruba Networks Rate Control Algorithm
    ath_dfs: Version 2.0.0
    Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved
    ath_spectrum: Version 2.0.0
    Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved
    ath_dev: Copyright (c) 2001-2007 Atheros Communications, Inc, All Rights Reserved
    ath_pci: 0.9.4.5 (Atheros/multi-bss)
    ath_attach: scn 87d80280 sc 87da0000 ah 87dc0000
    wifi0: Base BSSID 9c:1c:12:10:89:b8, 8 available BSSID(s)
    bond0 address=9c:1c:12:c9:08:9b
    br0 address=9c:1c:12:c9:08:9b
    wifi0: AP type AP-105, radio 0, max_bssids 8
    wifi0: Atheros 9280: mem=0x10010000, irq=49 hw_base=0xb0010000
    ath_attach: scn 86060280 sc 86080000 ah 860c0000
    wifi1: Base BSSID 9c:1c:12:10:89:b0, 8 available BSSID(s)
    bond0 address=9c:1c:12:c9:08:9b
    br0 address=9c:1c:12:c9:08:9b
    wifi1: AP type AP-105, radio 1, max_bssids 8
    wifi1: Atheros 9280: mem=0x10000000, irq=48 hw_base=0xb0000000
    ath_ahb: 0.9.4.5 (Atheros/multi-bss)

    Starting FIPS KAT ... Completed FIPS KAT

    AP rebooted Fri Dec 31 16:04:45 PST 1999; SAPD: Unable to contact switch: HELLO-TIMEOUT. Last Ctrl msg: HELLO len=11                                                                                                                          86 dest=10.100.9.2 tries=10 seq=0
    shutting down watchdog process (nanny will restart it)...

            <<<<<       Welcome to the Access Point     >>>>>

    ~ #
    ~ #
    ~ # ping 10.100.9.2
    PING 10.100.9.2 (10.100.9.2): 56 data bytes
    64 bytes from 10.100.9.2: icmp_seq=0 ttl=64 time=0.6 ms
    64 bytes from 10.100.9.2: icmp_seq=1 ttl=64 time=0.5 ms
    64 bytes from 10.100.9.2: icmp_seq=2 ttl=64 time=0.4 ms
    64 bytes from 10.100.9.2: icmp_seq=3 ttl=64 time=0.5 ms
    64 bytes from 10.100.9.2: icmp_seq=4 ttl=64 time=0.4 ms


    #AP225
    #7210


  • 2.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 11, 2015 09:47 AM

    Can you share the output of the system log from the controller?  It should give some indication as to what is going on.

     

    Check to see if you have Control Plane Security enabled and whether you have Auto Cert Provisioning enabled. 

     

    Also, make sure your IAPs are of the same regulatory domain as your controller; for example, rest of world vs. -US model.

     


    #7210


  • 3.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 12, 2015 03:11 AM

     

    Hi Clembo

     

    Control Plane Security is Enabled

    Auto Cert provisioning  no tick

     

    This controller has only two role ,Master and Local i havent see standalone mode inthe gui.

     

    Here is the fresh logs for ap and cont,

     

    for IAP-225

     


    APBoot 1.5.3.4 (build 43264)
    Built: 2014-04-16 at 15:38:45

    Model: AP-22x
    CPU0:  P1020E, Version: 1.1, (0x80ec0011)
    Core:  E500, Version: 5.1, (0x80212051)
    Clock:
           CPU0: 800 MHz
           CPU1: 800 MHz
           CCB:  400 MHz
           DDR:  333.333 MHz (666.667 MT/s data rate) (Asynchronous)
           LBC:   25 MHz
    L1:    D-cache 32KB enabled
           I-cache 32KB enabled
    I2C:   ready
    DRAM:  Configuring DDR for 666.667 MT/s data rate
    DDR:   512 MB (DDR3, 32-bit, CL=5, ECC off)
    POST1: memory passed
    Flash: 32 MB
    L2:    256 KB enabled
    Power: 802.3af POE
    PCIe1: RC, link up, x1
           dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
           00  00  14e4  43a2 00002   03 80000004 00000000 80200004 00000000
    PCIe2: RC, link up, x1
           dev fn venID devID class  rev    MBAR0    MBAR1    MBAR2    MBAR3
           00  00  14e4  43a1 00002   03 a0000004 00000000 a0200004 00000000
    Net:   eth0, eth1
    Radio: bcm43460#0, bcm43460#1

    Hit <Enter> to stop autoboot:  0
    Booting OS partition 0
    Checking image @ 0xee000000
    Copying image from 0xee000000

    Image is signed; verifying checksum... passed
    Signer Cert OK
    Policy Cert OK
    RSA signature verified.
    [    0.000000] Flash variant: default
    [    0.000000]
    [    0.000000] Aruba Networks
    [    0.000000] ArubaOS Version 6.4.2.3 (build 47524 / label #47524)
    [    0.000000] Built by p4build@minorca.arubanetworks.com on 2014-12-06 at 08:36:20 PST (gcc version 4.5.1)
    [    0.000000]
    [    0.000000] Memory: 509688k/524288k available (8952k kernel code, 14600k reserved, 496k data, 454k bss, 5560k init)
    [    0.002941] Processor 1 found.
    [    0.156852] Brought up 2 CPUs
    [    0.233378] PCI: Probing PCI hardware
    [    0.276103] PCI: Resetting PCI bus
    [    0.477126] pci 0000:00:00.0: PCI bridge to [bus 01-ff]
    [    0.539368] pci 0001:02:00.0: PCI bridge to [bus 03-ff]
    [    0.601653] pci 0000:01:00.0: BAR 2: assigned [mem 0x80000000-0x801fffff 64bit]
    [    0.688632] pci 0000:01:00.0: BAR 2: set to [mem 0x80000000-0x801fffff 64bit] (PCI address [0x80000000-0x801fffff]
    [    0.812543] pci 0000:01:00.0: BAR 0: assigned [mem 0x80200000-0x80207fff 64bit]
    [    0.900039] pci 0000:01:00.0: BAR 0: set to [mem 0x80200000-0x80207fff 64bit] (PCI address [0x80200000-0x80207fff]
    [    1.023993] pci 0000:00:00.0: enabling device (0106 -> 0107)
    [    1.091694] pci 0001:03:00.0: BAR 2: assigned [mem 0xa0000000-0xa01fffff 64bit]
    [    1.179189] pci 0001:03:00.0: BAR 2: set to [mem 0xa0000000-0xa01fffff 64bit] (PCI address [0xa0000000-0xa01fffff]
    [    1.303134] pci 0001:03:00.0: BAR 0: assigned [mem 0xa0200000-0xa0207fff 64bit]
    [    1.390632] pci 0001:03:00.0: BAR 0: set to [mem 0xa0200000-0xa0207fff 64bit] (PCI address [0xa0200000-0xa0207fff]
    [    1.514584] pci 0001:02:00.0: enabling device (0106 -> 0107)
    [    5.467946] Kprobe smoke test started
    [    5.543592] Kprobe smoke test passed successfully
    [    5.717075] ee000000.nor: Found 1 x16 devices at 0x0 in 16-bit bank
    [    5.792121] Amd/Fujitsu Extended Query Table at 0x0040
    [    5.853646] number of CFI chips: 1
    [    5.898405] fsl-gianfar ethernet.2: enabled errata workarounds, flags: 0x4
    [    5.981236] /proc/gfar_eth0_stats created
    [    6.031497] fsl-gianfar ethernet.3: enabled errata workarounds, flags: 0x4
    [    6.114249] /proc/gfar_eth1_stats created
    [    6.178367] Enabling watchdog on CPU 1
    [    6.178376] Enabling watchdog on CPU 0
    [    6.274754]
    [    6.274758] Starting Kernel SHA1 KAT ...Completed Kernel SHA1 KAT
    [    6.366529] Starting Kernel HMAC-SHA1 KAT ...Starting Kernel HMAC SHA1 FIPS KAT ...Completed Kernel HMAC SHA1 FIPS KAT
    [    6.376116] Starting Kernel HMAC SHA256 FIPS KAT ...Completed Kernel HMAC SHA256 FIPS KAT
    [    6.377063] Starting Kernel HMAC SHA384 FIPS KAT ...Completed Kernel HMAC SHA384 FIPS KAT
    [    6.377508] Starting Kernel HMAC SHA512 FIPS KAT ...Completed Kernel HMAC SHA512 FIPS KAT
    [    6.377921] Starting Kernel AES-CBC FIPS KAT ...Completed Kernel AES-CBC FIPS KAT
    [    6.576670] Starting Kernel AES-CCM FIPS KAT ...Completed Kernel AES-CCM FIPS KAT
    [    6.577129] Starting Kernel 3DES-CBC FIPS KAT ...Completed Kernel 3DES-CBC FIPS KAT
    [    7.070486] Completed Kernel HMAC-SHA1 KAT
    [    7.120521] Starting Kernel DES KAT ...Completed Kernel DES KAT
    [    7.192469] Starting Kernel AES KAT ...Completed Kernel AES KAT
    [    7.236264]
    Domain Name: arubanetworks.com
    No panic info available
    [    8.912569] p1020_soc: P1020 Misc Utils Driver version 1
    Ethernet port 1 mode: active-standby
    [   24.280128] ADDRCONF(NETDEV_UP): eth0: link is not ready
    [   24.346720] ADDRCONF(NETDEV_UP): bond0: link is not ready
    [   24.428033] bonding: bond0: enslaving eth0 as a backup interface with a down link.
    [   24.535554] bonding: bond0: enslaving eth1 as a backup interface with a down link.
    [   24.761726] AP xml model 66, num_radios 2 (jiffies 11730)
    [   24.826346] init_asap_mod: installation:0
    [   24.874288] radio 0: band 1 ant 0 max_ssid 16
    [   24.926392] radio 1: band 0 ant 0 max_ssid 16
    [   24.978507] ethernet_device_event: dev eth0 is up
    Starting watchdog process...
    Getting an IP address...
    [   27.979715] PHY: eth0 (mdio@ffe24000:00) - Link is Up - 1000/Full
    [   28.347147] bonding: bond0: link status definitely up for interface eth0.
    [   28.428450] bonding: bond0: making interface eth0 the new active one.
    [   28.505652] bonding: bond0: first active interface up!
    [   28.567396] ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
    10.100.9.3 255.255.255.0 10.100.9.1
    Running ADP...Done. Master is 10.100.9.2
    [   34.012229] wl 0000:01:00.0: enabling device (0000 -> 0002)
    [   34.105940] wifi0: AP type AP-225, radio 0, max_bssids 16
    [   34.449902] Shutting down eth1 due to insufficient POE voltage [power profile 2]
    [   34.540465] wl 0001:03:00.0: enabling device (0000 -> 0002)
    [   34.633030] wifi1: AP type AP-225, radio 1, max_bssids 16
    Clearing P1020 PCIe Error Status
    shutting down watchdog process (nanny will restart it)...

            <<<<<       Welcome to the Access Point     >>>>>

    ~ #
    ~ #
    ~

     

     

    For Controller 7210

     

    Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:39:04  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:39:04  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:39:04  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 13
    Feb 12 08:39:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:39:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:39:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:39:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:39:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:39:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:39:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:39:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:39:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:39:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:39:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:39:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:39:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:39:38  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:39:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
    Feb 12 08:39:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
    Feb 12 08:39:50  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:39:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:39:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:39:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:39:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:39:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:40:05  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:40:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:40:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:40:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:40:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:40:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:40:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:40:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:40:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:40:23  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:40:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:40:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:40:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:40:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:40:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:40:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:40:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:40:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:40:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:40:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:41:05  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8236:5018
    Feb 12 08:41:05  cfgm[3447]: <399815> <INFO> |cfgm|  Processing the Mobility Manager State message
    Feb 12 08:41:05  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8236:5018
    Feb 12 08:41:05  cfgm[3447]: <399815> <INFO> |cfgm|  Processing the Mobility Manager State message
    Feb 12 08:41:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:41:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:41:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:41:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:41:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:41:19  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:41:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:41:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:41:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:41:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:41:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:41:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:41:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:41:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:41:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
    Feb 12 08:41:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
    Feb 12 08:41:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:41:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:41:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:41:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:41:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:41:59  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:41:59  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 13
    Feb 12 08:42:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:42:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:42:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:42:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:42:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:42:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:42:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:42:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:42:24  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:42:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:42:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:42:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:42:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:42:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:42:51  stm[3642]: <305049> <WARN> |stm|  Unsecure AP "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.
    Feb 12 08:42:51  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:42:51  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:42:52  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:42:52  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:42:52  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:43:07  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:43:07  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:43:07  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:43:11  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:43:11  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:43:21  sapd[1735]: <311002> <WARN> |AP 94:b4:0f:c0:47:c2@10.100.9.3 sapd|  Rebooting: SAPD: Unable to contact switch: HELLO-TIMEOUT. Last Ctrl msg: HELLO len=1206 dest=10.100.9.2 tries=10 seq=0
    Feb 12 08:43:22  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:43:22  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:43:22  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:43:22  nanny[1678]: <303086> <ERRS> |AP 94:b4:0f:c0:47:c2@10.100.9.3 nanny| Process Manager (nanny) shutting down - AP will reboot!
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 5
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 11
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 29
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:24  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:43:24  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 38
    Feb 12 08:43:31  cfgm[3447]: <307026> <DBUG> |cfgm|  master: Refreshing the lms list
    Feb 12 08:43:31  cfgm[3447]: <307027> <DBUG> |cfgm|  Checking the LMS not responding flag for local 10.100.9.2 flag value is 1, missedHB 0 socketID -1
    Feb 12 08:43:37  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8231:5010
    Feb 12 08:43:37  cfgm[3447]: <307050> <DBUG> |cfgm| Received a IPSEC CFG Message
    Feb 12 08:43:37  cfgm[3447]: <307219> <DBUG> |cfgm| Sending the IPSEC Configuration
    Feb 12 08:43:39  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:39  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:39  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message
    Feb 12 08:43:39  cfgm[3447]: <307195> <DBUG> |cfgm|  In executeCommandObject() 360
    Feb 12 08:43:40  cfgm[3447]: <307048> <DBUG> |cfgm|  Got a message from 8344:5005
    Feb 12 08:43:40  cfgm[3447]: <399814> <DBUG> |cfgm|  replyGetLmsListRequest:307 Sending IP 10.100.9.2 to 8344
    Feb 12 08:43:42  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleMgmtMessage
    Feb 12 08:43:42  cfgm[3447]: <307001> <DBUG> |cfgm|  Check function is used handleOldStyleMgmtMessage
    Feb 12 08:43:42  cfgm[3447]: <307002> <DBUG> |cfgm|  master:Got a management message


    #7210

    Attachment(s)

    txt
    conf.txt   18 KB 1 version
    txt
    conf.txt   18 KB 1 version


  • 4.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 12, 2015 08:15 AM

    Hi,

     

    Its ok now, as you said, i disabled the "Control Plane Security" under Controller and discovered the AP, So what is the further configuration?  is there any best practice document?

     

    Thanks


    #7210


  • 5.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 13, 2015 06:56 AM

    Now it doesnt find the APs even this setting are disable.


    #7210


  • 6.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 14, 2015 08:58 AM

    This apparently was your issue from the message below.  

    "94:b4:0f:c0:47:c2" (MAC 94:b4:0f:c0:47:c2, IP 10.100.9.3) has been denied access because Control Plane Security is enabled and the AP is not approved.

     

    Control Plane Security is typically turned on, however you need to decide to enable auto-cert provisioning or selectively go in and approve the APs that are trying to connect.     Many customers will enable auto provisioning during a rollout and then perhaps disable once the environment is up and then manually approve ones; while others always leave it enabled.  When you decide what method you want to use, reboot the AP to foce it through the process.   If you want to take it a step further, delete the AP from the Control Plane Security whitelist and reboot the AP to start the process over.   It will take the AP a couple of reboots to go through the Control Plane Security negotiation.  For more details check out the following:

     

    http://www.arubanetworks.com/techdocs/ArubaOS_64x_WebHelp/Web_Help_Index.htm#ArubaFrameStyles/Control_Plane/Configuring_Control_Plan.htm


    #7210


  • 7.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Feb 19, 2015 03:06 AM

    Hi,

     

    Thanks,

     

    convert-aos ap ---- command was not working, i used gui to convert ap, now it is ok.


    #7210


  • 8.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Sep 07, 2015 11:36 AM

    Hi, there is some solution for that?

     

     I have the same error. Thank you


    #7210


  • 9.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Sep 07, 2015 04:35 PM

    The issue was ap type, solution is

     

    1. first of all create this DNS record in your dns server

    aruba-master   ip:x.x.x.x

     

    2. Connect to ap from console port and change AP mode.

     

    apboot> hit enter in 3 second
    AP# clear os 0
    AP# clear os 1

     

    3. Finally  connect it to network and it will find your controller automatically. Make sure 'Controle Plane Security' is Disabled under Configuration Menu.

     

    İ hope it help


    #7210


  • 10.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Sep 28, 2015 11:58 AM

    Hi Thank you very much for your answer.
    When i try connect the Aruba 225 through serial, but i only see a line of rare characters and i can't execute the command that you says.

     

    Do yo know similar issue?

     

    Thank you very much. Best regards.



  • 11.  RE: installing iap 225 and iap 105 to controller 7210

    EMPLOYEE
    Posted Sep 28, 2015 01:00 PM


  • 12.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Sep 28, 2015 03:22 PM

    Speed 9600

    Data bits 8

    Stop bits 1

    Parity None

    Flow control XON/XOFF

     

    Best regards



  • 13.  RE: installing iap 225 and iap 105 to controller 7210

    EMPLOYEE
    Posted Sep 28, 2015 03:23 PM

    Flow control should be set to "none"



  • 14.  RE: installing iap 225 and iap 105 to controller 7210

    Posted Sep 29, 2015 09:47 AM
      |   view attached

    Sorry my friend but still i can't connect trhougt serial... look please