Background :
1*ci Cisco Catalyst 3850 Switches, which combine wired and wireless by
supporting wireless tunnel termination and full wireless LAN controller
functionality
6*APs
1,
Basic switching
configurations
2,
Finish configuration
of WLC:
username cisco
privilege 15 password 0 cisco----username and
password for web access,
wireless management
interface Vlan1
interface Vlan1
ip address 10.17.0.10 255.255.0.0
enter web:
Https://10.17.0.10
Issue:
1, Occur error logs on AP and fails to register:
Translating
"CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
Premature end of
tar file
ERROR: Problem
extracting files from archive.
archive download:
takes 48 seconds
., 1)23
02:16:38.295: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded
max(CAPWAP_ECHO_REQUEST
*Sep 23
02:16:38.295: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to
10.17.0.10:5246
*Sep 23
02:16:38.295: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
*Sep 23
02:16:38.495: %CAPWAP-3-ERRORLOG: capwap ifs:
read error or timeout
*Sep 23
02:16:38.699: capwap_image_proc: problem extracting tar file
*Sep 23
02:16:47.563: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
*Sep 23
02:16:57.563: %CAPWAP-3-ERRORLOG: Go join a capwap controller
examining image...!
extracting info
(288 bytes)
Image info:
Version Suffix: k9w8-.152-2.JN1
Image Name: ap3g2-k9w8-mx.152-2.JN1
Version Directory: ap3g2-k9w8-mx.152-2.JN1
Ios Image Size: 1300992
Total Image Size: 11274752
Image Feature: WIRELESS LAN|LWAPP
Image Family: AP3G2
Wireless Switch Management Version:
10.0.111.0
Extracting files...
ap3g2-k9w8-mx.152-2.JN1/
(directory) 0 (bytes)
extracting
ap3g2-k9w8-mx.152-2.JN1/Y2.bin (5830 bytes)
extracting
ap3g2-k9w8-mx.152-2.JN1/8004.img (1092276 bytes)!!!!!!
*Sep 23
02:16:58.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip:
10.17.0.10 peer_port: 5246
*Sep 23
02:16:58.287: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
peer_ip: 10.17.0.10 peer_port: 5246
*Sep 23
02:16:58.287: %CAPWAP-5-SENDJOIN: sending Join Request to
10.17.0.10FirstCapwapVersionHasImage = 7.1.1.0
perform archive
download capwap:/ap3g2 tar file
*Sep 23
02:16:58.291: %CAPWAP-6-AP_IMG_DWNLD: Required image not found on AP.
Downloading image from Controller.!!!!!!!
*Sep 23
02:16:58.295: Loading file /ap3g2...
!!!!!!!
wireless mobility
controller
to get rid of it
complete configurations:
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show run
Building configuration...
Current configuration : 6099 bytes
!
! Last configuration change at 02:27:13 UTC Tue Sep 24 2013 by cisco
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service compress-config
!
hostname CHD-SW-0
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 4 tnhtc92DXBhelxjYk8LWJrPV36S2i4ntXrpb4RFmfqY
!
username cisco privilege 15 password 0 cisco
aaa new-model
aaa local authentication default authorization default
!
!
aaa group server radius Auth
server name Server1
server name Server2
!
aaa authentication dot1x Auth group Auth
!
!
!
!
!
aaa session-id common
switch 1 provision ws-c3850-24p
!
ip device tracking
!
!
qos wireless-default-untrust
!
crypto pki trustpoint TP-self-signed-1810322888
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1810322888
revocation-check none
rsakeypair TP-self-signed-1810322888
!
!
crypto pki certificate chain TP-self-signed-1810322888
certificate self-signed 01
3082024D 308201B6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31383130 33323238 3838301E 170D3133 30393233 32323234
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 38313033
32323838 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D18B BB349381 45184441 118A4850 AC4F06FE B98FB7D7 CD7092BB 9DF75E28
0C9E43C2 A99E1347 EC383547 724BB7B4 9CB7B1F0 CFF6C210 E58D1DD8 D93FE64B
A0D8F15A 150C1401 5EFFD83F 0ADE5150 A7678755 089D205E 21466A31 98AD6003
912C6254 CA28CB96 9501D838 C09FE4A5 EBA94EC1 8B8DA487 48D1B3AC B968755D
7B870203 010001A3 75307330 0F060355 1D130101 FF040530 030101FF 30200603
551D1104 19301782 1554686F 75676874 576F726B 732D4344 2D533338 3530301F
0603551D 23041830 168014AC 26F37FE9 FF325514 33F5EE46 47F4C82A 580D4730
1D060355 1D0E0416 0414AC26 F37FE9FF 32551433 F5EE4647 F4C82A58 0D47300D
06092A86 4886F70D 01010405 00038181 00532160 1FC65E22 6A706B3A 891B2A4C
DFEFB0AC 2C7C7A30 43E83015 5DBB7200 51A6A35F 6EC6715B 869618BA C50CBCA0
A5606698 FB0F632B 8194388D 40C7B9D2 C545A003 990A974B D4ED4EE7 9B0061AA
B96CC9AF A84C5E40 F00DF174 C95D85DC BDBC212E BBA66E93 2408B277 A416C32B
47AEB220 46ED9AAD 62185F30 638B3DAF 95
quit
dot1x system-auth-control
!
!
!
!
!
diagnostic bootup level minimal
identity policy webauth-global-inactive
inactivity-timer 3600
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
description connect-ap1
switchport mode access
!
interface GigabitEthernet1/0/2
description connect-ap2
switchport mode access
!
interface GigabitEthernet1/0/3
switchport mode access
!
interface GigabitEthernet1/0/4
switchport mode access
!
interface GigabitEthernet1/0/5
switchport mode access
!
interface GigabitEthernet1/0/6
switchport mode access
!
interface GigabitEthernet1/0/7
switchport mode access
!
interface GigabitEthernet1/0/8
switchport mode access
!
interface GigabitEthernet1/0/9
switchport mode access
!
interface GigabitEthernet1/0/10
switchport mode access
!
interface GigabitEthernet1/0/11
switchport mode access
!
interface GigabitEthernet1/0/12
switchport mode access
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
ip address 10.17.0.10 255.255.0.0
!
interface Vlan117
no ip address
!
no ip http server
ip http authentication local
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.17.0.253
!
!
no logging trap
!
!
!
radius server Server1
address ipv4 10.18.1.3 auth-port 1812 acct-port 1813
key secretkey
!
radius server Server2
address ipv4 10.17.1.1 auth-port 1812 acct-port 1813
key secretkey
!
!
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password cisco
line vty 5 15
!
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
profile httpslistener
wsma agent notify
profile httplistener
profile httpslistener
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
wireless mobility controller
wireless management interface Vlan1
wireless client fast-ssid-change
wlan twguest 2 twguest
client vlan twguest
session-timeout 1800
no shutdown
wlan twdata 1 twdata
ip dhcp server 10.17.1.2
security dot1x authentication-list Auth
session-timeout 1800
no shutdown
ap country CN
ap dot11 24ghz rrm channel dca 1
ap dot11 24ghz rrm channel dca 6
ap dot11 24ghz rrm channel dca 11
ap dot11 5ghz rrm channel dca 36
ap dot11 5ghz rrm channel dca 40
ap dot11 5ghz rrm channel dca 44
ap dot11 5ghz rrm channel dca 48
ap dot11 5ghz rrm channel dca 52
ap dot11 5ghz rrm channel dca 56
ap dot11 5ghz rrm channel dca 60
ap dot11 5ghz rrm channel dca 64
ap dot11 5ghz rrm channel dca 149
ap dot11 5ghz rrm channel dca 153
ap dot11 5ghz rrm channel dca 157
ap dot11 5ghz rrm channel dca 161
ap group default-group
end
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#dir
CHD-SW-0#dir
Directory of flash:/
7746 -rwx 2097152 Sep 24 2013 03:28:23 +00:00 nvram_config
7747 -rwx 74369252 Aug 28 2013 10:38:38 +00:00 cat3k_caa-base.SPA.03.02.02.SE.pkg
7748 -rwx 5808828 Aug 28 2013 10:38:39 +00:00 cat3k_caa-drivers.SPA.03.02.02.SE.pkg
7749 -rwx 32488292 Aug 28 2013 10:38:38 +00:00 cat3k_caa-infra.SPA.03.02.02.SE.pkg
7750 -rwx 30403764 Aug 28 2013 10:38:39 +00:00 cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
7751 -rwx 16079584 Aug 28 2013 10:38:38 +00:00 cat3k_caa-platform.SPA.03.02.02.SE.pkg
7752 -rwx 64580300 Aug 28 2013 10:38:39 +00:00 cat3k_caa-wcm.SPA.10.0.111.0.pkg
7753 -rwx 1224 Aug 28 2013 10:38:49 +00:00 packages.conf
7754 -rwx 616 Sep 23 2013 21:52:50 +00:00 vlan.dat
1621966848 bytes total (1393430528 bytes free)
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show ver
Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.02.02.SE RELEASE SOFTWARE (fc
2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Fri 14-Jun-13 19:24 by prod_rel_team
Cisco IOS-XE software, Copyright (c) 2005-2013 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.
(http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 1.2, RELEASE SOFTWARE (P)
CHD-SW-0 uptime is 5 hours, 8 minutes
Uptime for this control processor is 5 hours, 11 minutes
System returned to ROM by reload
System image file is "flash:packages.conf"
Last reload reason: Reload command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
License Level: Ipservices
License Type: Permanent
Next reload license Level: Ipservices
cisco WS-C3850-24P (MIPS) processor with 4194304K bytes of physical memory.
Processor board ID FOC1731U0SP
2 Virtual Ethernet interfaces
28 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of Dummy USB Flash at usbflash0:.
0K bytes of at webui:.
Base Ethernet MAC Address : 7c:95:f3:a2:5c:80
Motherboard Assembly Number : 73-14441-06
Motherboard Serial Number : FOC17306KYR
Model Revision Number : F0
Motherboard Revision Number : B0
Model Number : WS-C3850-24P
System Serial Number : FOC1731U0SP
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
1 32 WS-C3850-24P 03.02.02.SE cat3k_caa-universalk9 INSTALL
Configuration register is 0x102
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show ap
CHD-SW-0#show ap n
CHD-SW-0#show ap name AP-1 ?
auto-rf Auto-RF information for a Cisco AP
bhmode Show Cisco Bridge Backhaul Mode
bhrate Show Cisco Bridge Backhaul Rate
cac Display Call Admission Control details
capwap AP Capwap parameters
ccx Shows ccx related information
cdp Shows Cisco AP cdp information
channel Shows the channel information of an Cisco AP
config Shows the configuration of an Cisco AP
core-dump Shows the AP memory core dump setting for an Cisco AP
data-plane Show data plane status
dot11 Show 802.11 parameters
ethernet Shows ethernet information
eventlog Downloads and displays the event log of a Cisco AP
image Shows the images present on a Cisco AP
inventory Displays the inventory of a Cisco AP
link-encryption Show link encryption status
service-policy Show service policy information
tcp-adjust-mss Show tcp-adjust-mss for an AP
wlan Show BSSIDs for each AP
CHD-SW-0#show ap name AP-1 confi
CHD-SW-0#show ap name AP-1 config
% Incomplete command.
CHD-SW-0#show ap name AP-1 config ?
dot11 Show 802.11 parameters
ethernet Shows Ethernet Vlan tagging Info
general Shows common information for Cisco AP
slot Shows common information for Slot
CHD-SW-0#show ap name AP-1 config ge
CHD-SW-0#show ap name AP-1 config general
Cisco AP Name : AP-1
Cisco AP Identifier : 23
Country Code : CN - China
Regulatory Domain Allowed by Country : 802.11bg:-CE 802.11a:-C
AP Country Code : CN - China
AP Regulatory Domain : Unconfigured
Switch Port Number : Gi1/0/1
MAC Address : c08c.60b0.2583
IP Address Configuration : Static IP assigned
IP Address : 10.17.0.231
IP Netmask : 255.255.0.0
Gateway IP Address : 10.17.0.253
Fallback IP Address Being Used : 10.17.0.231
Domain :
Name Server : 0.0.0.0
CAPWAP Path MTU : 1500
Telnet State : Disabled
SSH State : Disabled
Cisco AP Location : default location
Cisco AP Group Name : default-group
Administrative State : Enabled
Operation State : Registered
AP Mode : Local
AP Submode : Not Configured
Remote AP Debug : Disabled
Logging Trap Severity Level : informational
Software Version : 10.0.111.0
Boot Version : 15.2.2.4
Stats Reporting Period : 180
LED State : Enabled
PoE Pre-Standard Switch : Disabled
PoE Power Injector MAC Address : Disabled
Power Type/Mode : Power Injector/Normal Mode
Number of Slots : 2
AP Model : 3602I
AP Image : C3600-K9W8-M
IOS Version : 15.2(2)JN1$
Reset Button : Enabled
AP Serial Number : FGL1735W2DE
AP Certificate Type : Manufacture Installed
Management Frame Protection Validation : Disabled
AP User Mode : Automatic
AP User Name : Not Configured
AP 802.1X User Mode : Not Configured
AP 802.1X User Name : Not Configured
Cisco AP System Logging Host : 255.255.255.255
AP Up Time : 1 hour 8 minutes 5 seconds
AP CAPWAP Up Time : 1 hour 6 minutes 51 seconds
Join Date and Time : 09/24/2013 02:34:21
Join Taken Time : 1 minute 13 seconds
Ethernet Port Duplex : Auto
Ethernet Port Speed : Auto
AP Link Latency : Disabled
Rogue Detection : Enabled
AP TCP MSS Adjust : Disabled
AP TCP MSS Size : 0
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show run
Building configuration...
Current configuration : 6099 bytes
!
! Last configuration change at 02:27:13 UTC Tue Sep 24 2013 by cisco
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service compress-config
!
hostname CHD-SW-0
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 4 tnhtc92DXBhelxjYk8LWJrPV36S2i4ntXrpb4RFmfqY
!
username cisco privilege 15 password 0 cisco
aaa new-model
aaa local authentication default authorization default
!
!
aaa group server radius Auth
server name Server1
server name Server2
!
aaa authentication dot1x Auth group Auth
!
!
!
!
!
aaa session-id common
switch 1 provision ws-c3850-24p
!
ip device tracking
!
!
qos wireless-default-untrust
!
crypto pki trustpoint TP-self-signed-1810322888
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1810322888
revocation-check none
rsakeypair TP-self-signed-1810322888
!
!
crypto pki certificate chain TP-self-signed-1810322888
certificate self-signed 01
3082024D 308201B6 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31383130 33323238 3838301E 170D3133 30393233 32323234
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 38313033
32323838 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D18B BB349381 45184441 118A4850 AC4F06FE B98FB7D7 CD7092BB 9DF75E28
0C9E43C2 A99E1347 EC383547 724BB7B4 9CB7B1F0 CFF6C210 E58D1DD8 D93FE64B
A0D8F15A 150C1401 5EFFD83F 0ADE5150 A7678755 089D205E 21466A31 98AD6003
912C6254 CA28CB96 9501D838 C09FE4A5 EBA94EC1 8B8DA487 48D1B3AC B968755D
7B870203 010001A3 75307330 0F060355 1D130101 FF040530 030101FF 30200603
551D1104 19301782 1554686F 75676874 576F726B 732D4344 2D533338 3530301F
0603551D 23041830 168014AC 26F37FE9 FF325514 33F5EE46 47F4C82A 580D4730
1D060355 1D0E0416 0414AC26 F37FE9FF 32551433 F5EE4647 F4C82A58 0D47300D
06092A86 4886F70D 01010405 00038181 00532160 1FC65E22 6A706B3A 891B2A4C
DFEFB0AC 2C7C7A30 43E83015 5DBB7200 51A6A35F 6EC6715B 869618BA C50CBCA0
A5606698 FB0F632B 8194388D 40C7B9D2 C545A003 990A974B D4ED4EE7 9B0061AA
B96CC9AF A84C5E40 F00DF174 C95D85DC BDBC212E BBA66E93 2408B277 A416C32B
47AEB220 46ED9AAD 62185F30 638B3DAF 95
quit
dot1x system-auth-control
!
!
!
!
!
diagnostic bootup level minimal
identity policy webauth-global-inactive
inactivity-timer 3600
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
description connect-ap1
switchport mode access
!
interface GigabitEthernet1/0/2
description connect-ap2
switchport mode access
!
interface GigabitEthernet1/0/3
switchport mode access
!
interface GigabitEthernet1/0/4
switchport mode access
!
interface GigabitEthernet1/0/5
switchport mode access
!
interface GigabitEthernet1/0/6
switchport mode access
!
interface GigabitEthernet1/0/7
switchport mode access
!
interface GigabitEthernet1/0/8
switchport mode access
!
interface GigabitEthernet1/0/9
switchport mode access
!
interface GigabitEthernet1/0/10
switchport mode access
!
interface GigabitEthernet1/0/11
switchport mode access
!
interface GigabitEthernet1/0/12
switchport mode access
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
ip address 10.17.0.10 255.255.0.0
!
interface Vlan117
no ip address
!
no ip http server
ip http authentication local
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.17.0.253
!
!
no logging trap
!
!
!
radius server Server1
address ipv4 10.18.1.3 auth-port 1812 acct-port 1813
key secretkey
!
radius server Server2
address ipv4 10.17.1.1 auth-port 1812 acct-port 1813
key secretkey
!
!
!
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password cisco
line vty 5 15
!
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
profile httpslistener
wsma agent notify
profile httplistener
profile httpslistener
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
wireless mobility controller
wireless management interface Vlan1
wireless client fast-ssid-change
wlan twguest 2 twguest
client vlan twguest
session-timeout 1800
no shutdown
wlan twdata 1 twdata
ip dhcp server 10.17.1.2
security dot1x authentication-list Auth
session-timeout 1800
no shutdown
ap country CN
ap dot11 24ghz rrm channel dca 1
ap dot11 24ghz rrm channel dca 6
ap dot11 24ghz rrm channel dca 11
ap dot11 5ghz rrm channel dca 36
ap dot11 5ghz rrm channel dca 40
ap dot11 5ghz rrm channel dca 44
ap dot11 5ghz rrm channel dca 48
ap dot11 5ghz rrm channel dca 52
ap dot11 5ghz rrm channel dca 56
ap dot11 5ghz rrm channel dca 60
ap dot11 5ghz rrm channel dca 64
ap dot11 5ghz rrm channel dca 149
ap dot11 5ghz rrm channel dca 153
ap dot11 5ghz rrm channel dca 157
ap dot11 5ghz rrm channel dca 161
ap group default-group
end
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#dir
CHD-SW-0#dir
Directory of flash:/
7746 -rwx 2097152 Sep 24 2013 03:28:23 +00:00 nvram_config
7747 -rwx 74369252 Aug 28 2013 10:38:38 +00:00 cat3k_caa-base.SPA.03.02.02.SE.pkg
7748 -rwx 5808828 Aug 28 2013 10:38:39 +00:00 cat3k_caa-drivers.SPA.03.02.02.SE.pkg
7749 -rwx 32488292 Aug 28 2013 10:38:38 +00:00 cat3k_caa-infra.SPA.03.02.02.SE.pkg
7750 -rwx 30403764 Aug 28 2013 10:38:39 +00:00 cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
7751 -rwx 16079584 Aug 28 2013 10:38:38 +00:00 cat3k_caa-platform.SPA.03.02.02.SE.pkg
7752 -rwx 64580300 Aug 28 2013 10:38:39 +00:00 cat3k_caa-wcm.SPA.10.0.111.0.pkg
7753 -rwx 1224 Aug 28 2013 10:38:49 +00:00 packages.conf
7754 -rwx 616 Sep 23 2013 21:52:50 +00:00 vlan.dat
1621966848 bytes total (1393430528 bytes free)
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show ver
Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.02.02.SE RELEASE SOFTWARE (fc
2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Fri 14-Jun-13 19:24 by prod_rel_team
Cisco IOS-XE software, Copyright (c) 2005-2013 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.
(http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 1.2, RELEASE SOFTWARE (P)
CHD-SW-0 uptime is 5 hours, 8 minutes
Uptime for this control processor is 5 hours, 11 minutes
System returned to ROM by reload
System image file is "flash:packages.conf"
Last reload reason: Reload command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
License Level: Ipservices
License Type: Permanent
Next reload license Level: Ipservices
cisco WS-C3850-24P (MIPS) processor with 4194304K bytes of physical memory.
Processor board ID FOC1731U0SP
2 Virtual Ethernet interfaces
28 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of Dummy USB Flash at usbflash0:.
0K bytes of at webui:.
Base Ethernet MAC Address : 7c:95:f3:a2:5c:80
Motherboard Assembly Number : 73-14441-06
Motherboard Serial Number : FOC17306KYR
Model Revision Number : F0
Motherboard Revision Number : B0
Model Number : WS-C3850-24P
System Serial Number : FOC1731U0SP
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
1 32 WS-C3850-24P 03.02.02.SE cat3k_caa-universalk9 INSTALL
Configuration register is 0x102
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#
CHD-SW-0#show ap
CHD-SW-0#show ap n
CHD-SW-0#show ap name AP-1 ?
auto-rf Auto-RF information for a Cisco AP
bhmode Show Cisco Bridge Backhaul Mode
bhrate Show Cisco Bridge Backhaul Rate
cac Display Call Admission Control details
capwap AP Capwap parameters
ccx Shows ccx related information
cdp Shows Cisco AP cdp information
channel Shows the channel information of an Cisco AP
config Shows the configuration of an Cisco AP
core-dump Shows the AP memory core dump setting for an Cisco AP
data-plane Show data plane status
dot11 Show 802.11 parameters
ethernet Shows ethernet information
eventlog Downloads and displays the event log of a Cisco AP
image Shows the images present on a Cisco AP
inventory Displays the inventory of a Cisco AP
link-encryption Show link encryption status
service-policy Show service policy information
tcp-adjust-mss Show tcp-adjust-mss for an AP
wlan Show BSSIDs for each AP
CHD-SW-0#show ap name AP-1 confi
CHD-SW-0#show ap name AP-1 config
% Incomplete command.
CHD-SW-0#show ap name AP-1 config ?
dot11 Show 802.11 parameters
ethernet Shows Ethernet Vlan tagging Info
general Shows common information for Cisco AP
slot Shows common information for Slot
CHD-SW-0#show ap name AP-1 config ge
CHD-SW-0#show ap name AP-1 config general
Cisco AP Name : AP-1
Cisco AP Identifier : 23
Country Code : CN - China
Regulatory Domain Allowed by Country : 802.11bg:-CE 802.11a:-C
AP Country Code : CN - China
AP Regulatory Domain : Unconfigured
Switch Port Number : Gi1/0/1
MAC Address : c08c.60b0.2583
IP Address Configuration : Static IP assigned
IP Address : 10.17.0.231
IP Netmask : 255.255.0.0
Gateway IP Address : 10.17.0.253
Fallback IP Address Being Used : 10.17.0.231
Domain :
Name Server : 0.0.0.0
CAPWAP Path MTU : 1500
Telnet State : Disabled
SSH State : Disabled
Cisco AP Location : default location
Cisco AP Group Name : default-group
Administrative State : Enabled
Operation State : Registered
AP Mode : Local
AP Submode : Not Configured
Remote AP Debug : Disabled
Logging Trap Severity Level : informational
Software Version : 10.0.111.0
Boot Version : 15.2.2.4
Stats Reporting Period : 180
LED State : Enabled
PoE Pre-Standard Switch : Disabled
PoE Power Injector MAC Address : Disabled
Power Type/Mode : Power Injector/Normal Mode
Number of Slots : 2
AP Model : 3602I
AP Image : C3600-K9W8-M
IOS Version : 15.2(2)JN1$
Reset Button : Enabled
AP Serial Number : FGL1735W2DE
AP Certificate Type : Manufacture Installed
Management Frame Protection Validation : Disabled
AP User Mode : Automatic
AP User Name : Not Configured
AP 802.1X User Mode : Not Configured
AP 802.1X User Name : Not Configured
Cisco AP System Logging Host : 255.255.255.255
AP Up Time : 1 hour 8 minutes 5 seconds
AP CAPWAP Up Time : 1 hour 6 minutes 51 seconds
Join Date and Time : 09/24/2013 02:34:21
Join Taken Time : 1 minute 13 seconds
Ethernet Port Duplex : Auto
Ethernet Port Speed : Auto
AP Link Latency : Disabled
Rogue Detection : Enabled
AP TCP MSS Adjust : Disabled
AP TCP MSS Size : 0
No comments:
Post a Comment