Gebrauchten Cisco 1852 mit Mobility Express zum laufen bekommen
Hallo,
ich habe hier 3 gebrauchte Cisco AIR-AP1852I-E-K9 WLAN APs zu rumspielen.
Ich möchte die mit mobility Express nutzten, so dass ich, glaube ich zumindest, Aquis Anleitung nicht nutzen kann.
Aktuell habe ich nur 1 Geräte an mein Netzwerk angeschlossen.
Strom kommt per PoE.
Die Consolen-Verbindung in Putty funktioniert.
Das Gerät bekommt eine IP-Adresse per DHCP.
Die WIFI-Ports sind "administatively down".
Ich kann die IP-Adresse anpingen, aber es läuft kein http/https darauf.
In verschiedenen Videos packt Jemand so ein Gerät aus, schliesst es an einen Switch an und öffnet direkt danach eine Webseite oder verbindet sich mit einem WLAN zum konfigurieren.
Ich habe auf der Console "capwap ap erase all" ein Extra-Reset durchgeführt und laut Anleitung von Cisco sollte auf der Console ein Wizard starten.
Ich vermute, dass es ein falsches Image sein könnte. Es ist auch nicht das aktuellste.
Bevor ich das jetzt drüberbrezle wollte ich Euch bitte da einmal drauf zu schauen wie der weitere Weg ist.
Danke
Stefan
Alle paar Sekunden erscheint dieser Text.
Anbei der Status
Botlog
ich habe hier 3 gebrauchte Cisco AIR-AP1852I-E-K9 WLAN APs zu rumspielen.
Ich möchte die mit mobility Express nutzten, so dass ich, glaube ich zumindest, Aquis Anleitung nicht nutzen kann.
Aktuell habe ich nur 1 Geräte an mein Netzwerk angeschlossen.
Strom kommt per PoE.
Die Consolen-Verbindung in Putty funktioniert.
Das Gerät bekommt eine IP-Adresse per DHCP.
Die WIFI-Ports sind "administatively down".
Ich kann die IP-Adresse anpingen, aber es läuft kein http/https darauf.
In verschiedenen Videos packt Jemand so ein Gerät aus, schliesst es an einen Switch an und öffnet direkt danach eine Webseite oder verbindet sich mit einem WLAN zum konfigurieren.
Ich habe auf der Console "capwap ap erase all" ein Extra-Reset durchgeführt und laut Anleitung von Cisco sollte auf der Console ein Wizard starten.
Ich vermute, dass es ein falsches Image sein könnte. Es ist auch nicht das aktuellste.
Bevor ich das jetzt drüberbrezle wollte ich Euch bitte da einmal drauf zu schauen wie der weitere Weg ist.
Danke
Stefan
Alle paar Sekunden erscheint dieser Text.
[*01/20/2022 16:48:59.2200] CAPWAP State: Discovery
[*01/20/2022 16:48:59.2300] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:48:59.2300] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
Anbei der Status
sh ip int br
Interface IP-Address Method Status Protocol Speed Duplex
wired0 172.31.0.142 DHCP up up 1000 full
wired1 n/a n/a down up n/a n/a
wifi0 n/a n/a administatively down down n/a n/a
wifi1 n/a n/a administatively down down n/a n/a
Botlog
U-Boot 2012.07 (btldr release 31) (Jan 07 2021 - 10:12:35)
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
DRAM: 1 GiB
NAND (ONFI): Detected MICRON MT29F2G08ABBEAH4 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:0], write_counter=9
PCI0 Link Intialized
PCI1 Link Intialized
Net:
PHY ID = 0x4dd074, eth0 found AR8033 PHY
PHY ID = 0x4dd074, eth1 found AR8033 PHY
Valid I2C chip addresses: 51 52
AP 1832/1852 detected...
Power Type: 802.3at POE detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot: 0
Specified BOOT: part1
Booting from part1
Read 1024 bytes from volume part1 to 45000000
Read 26087748 bytes from volume part1 to 45000000
UBI: fixable bit-flip detected at PEB 1717
UBI: schedule PEB 1717 for scrubbing
UBI: fixable bit-flip detected at PEB 1797
UBI: schedule PEB 1797 for scrubbing
UBI: fixable bit-flip detected at PEB 1797
Signature returns 0
Image signing verification success, continue to run...
Using machid 0x1260 from environment
Starting image ...
[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M console=ttyHSL1,9600n8 activepa
[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
[01/01/1970 00:00:00.2200]
[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
[01/01/1970 00:00:16.3050] ACPU PVS: 0
[01/01/1970 00:00:18.7643] buginf tty flushing thread started, ttyport=ef51f090
[*01/01/1970 00:00:24.8324] buginf() enabled.
[*01/01/1970 00:00:24.8424] Made it into bootsh: Aug 29 2021 21:58:47
[*01/01/1970 00:00:24.8424] bootsh build T-f325ed3545df412676da6b1ee7285fdab3ca998e-gf325ed35-aut
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.
This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
http://www.gnu.org/licenses/agpl-3.0.html.
init started: BusyBox v1.23.2 (2021-08-29 21:42:42 PDT)
[*01/01/1970 00:00:28.1713] GCM-128 POST passed
[*01/01/1970 00:00:28.1713] GCM-256 POST passed
[*01/01/1970 00:00:28.2813] === 5G radio domain is 12, COPY 5G BDF files from ETSI_BDF folder ===
[*01/01/1970 00:00:28.3313] 0
[*01/01/1970 00:00:28.5612] Active version: 8.5.182.0
[*01/01/1970 00:00:28.5612] Backup version: 8.5.151.0
Jan 1 00:00:28 FIPS[1599]: *** shell: FIPS Mode = disabled ***
User Access Verification
Username: [*01/01/1970 00:00:28.7811]
[*01/01/1970 00:00:28.7811] led pattern module start
[*01/01/1970 00:00:28.8211] AP1852I
[*01/01/1970 00:00:28.9211] nss_driver - Turbo Support 1
[*01/01/1970 00:00:28.9211] Supported Frequencies - 110Mhz 550Mhz 733Mhz
[*01/01/1970 00:00:28.9611] NSS firmware booted
[*01/01/1970 00:00:28.9911] NSS firmware booted
[*01/01/1970 00:00:29.4409] Current value of FACTORY_RESET=0
[*01/01/1970 00:00:29.4609] Last reload time: Jan 20 16:44:43 2022
[*01/20/2022 16:44:43.0000] Setting system time Thu Jan 20 16:44:43 UTC 2022
[*01/20/2022 16:44:43.0599] device wired0 entered promiscuous mode
[*01/20/2022 16:44:43.1299] device wired1 entered promiscuous mode
[*01/20/2022 16:44:43.5498] stile module dp init successfully
[*01/20/2022 16:44:43.5498] NBAR Label:BLD_V155_3_S_XE316_THROTTLE_LATEST_20180404_162221 NBAR VERSION:module build d
[*01/20/2022 16:44:44.2096] miibus get eecac400!
[*01/20/2022 16:44:44.2396]
[*01/20/2022 16:44:44.2496] boot 6 build T-f325ed3545df412676da6b1ee7285fdab3ca998e-gf325ed35-aut board corsica mac 6
[*01/20/2022 16:44:44.2596] Module: mbedtls .text=0xbf000000 data=0xbf007e18 bss=0xbf008070
[*01/20/2022 16:44:44.2596] Module: aptrace .text=0xbf00c000 data=0xbf018834 bss=0xbf018cc0
[*01/20/2022 16:44:44.2596] Module: led_module .text=0xbf020000 data=0xbf0204e0 bss=0xbf020b48
[*01/20/2022 16:44:44.2596] Module: qca_nss_gmac .text=0xbf024000 data=0xbf02abd4 bss=0xbf02b098
[*01/20/2022 16:44:44.2596] Module: qca_nss_drv .text=0xbf034000 data=0xbf04fb70 bss=0xbf050920
[*01/20/2022 16:44:44.2596] Module: qca_nss_capwapmgr .text=0xbf071000 data=0xbf075bd4 bss=0xbf075d28
[*01/20/2022 16:44:44.2596] Module: nssmgrctl .text=0xbf07c000 data=0xbf07d768 bss=0xbf07da8c
[*01/20/2022 16:44:44.2596] Module: proclikefs .text=0xbf083000 data= bss=0xbf083b40
[*01/20/2022 16:44:44.2596] Module: stile_lm_ft .text= data= bss=
[*01/20/2022 16:44:44.2596] Module: stile_lm_dp .text= data= bss=
[*01/20/2022 16:44:44.2596] Module: ipv6 .text=0xbfa13000 data=0xbfa43fc0 bss=0xbfa4586c
[*01/20/2022 16:44:44.2596] Module: bonding .text=0xbfa5f000 data=0xbfa70640 bss=0xbfa70a6c
[*01/20/2022 16:44:44.2596] Module: lowmemorykiller .text=0xbfa7d000 data=0xbfa7d2c0 bss=0xbfa7d44c
[*01/20/2022 16:44:44.2596] Module: qca_nss_profile_drv .text=0xbfa81000 data=0xbfa82320 bss=0xbfa8249
[*01/20/2022 16:44:44.2596] Module: scsi_wait_scan .text= data= bss=
[*01/20/2022 16:44:44.2596] Module: ssdk_reg .text=0xbfa8b000 data= bss=0xbfa8b838
[*01/20/2022 16:44:44.6895] Last reload reason : 2: Factory Reset
[*01/20/2022 16:44:46.2890] __mm_init_module
[*01/20/2022 16:44:46.3290]
[*01/20/2022 16:44:46.3290] __ol_ath_attach() Allocated scn ed040480
[*01/20/2022 16:44:46.3390] ol_ath_attach interface_id 0
[*01/20/2022 16:44:46.3390] Chip id: 0x9, chip version: 0x1000000
[*01/20/2022 16:44:46.3390]
[*01/20/2022 16:44:46.3390] Target Version is 1000000
[*01/20/2022 16:44:46.3390]
[*01/20/2022 16:44:46.3390] Flash Download Address c0000
[*01/20/2022 16:44:46.3390] ol_transfer_bin_file: flash data file defined
[*01/20/2022 16:44:46.3390] Cal location [0]: 00000000
[*01/20/2022 16:44:46.3390]
[*01/20/2022 16:44:46.3390] Wifi0 NAND FLASH Select OFFSET 0x1000
[*01/20/2022 16:44:46.3589] qc98xx_verify_checksum: flash checksum passed: 0xcb2b
[*01/20/2022 16:44:46.3589] ol_transfer_bin_file 3979: Download Flash data len 12064
[*01/20/2022 16:44:46.3789]
[*01/20/2022 16:44:46.3789] Board data initialized
[*01/20/2022 16:44:46.4289] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return pa
[*01/20/2022 16:44:46.4289] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
[*01/20/2022 16:44:46.4289] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/b
[*01/20/2022 16:44:46.5089]
[*01/20/2022 16:44:46.5089] [Flash] : Ignore Module param
[*01/20/2022 16:44:46.5089] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*01/20/2022 16:44:46.5289] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*01/20/2022 16:44:47.6286] HTC Rx: insufficient length, got:4 expected =8
[*01/20/2022 16:44:47.6385] Startup Mode-0 set
[*01/20/2022 16:44:47.6385] HTC Service:0x0300 ep:1 TX flow control disabled
[*01/20/2022 16:44:47.6385] HTC Service:0x0100 ep:2 TX flow control disabled
[*01/20/2022 16:44:47.6385] Firmware_Build_Number:70
[*01/20/2022 16:44:47.6385] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x
[*01/20/2022 16:44:47.6385]
[*01/20/2022 16:44:47.6385] RES CFG Support wmi_service_bitmap 9778
[*01/20/2022 16:44:47.6385]
[*01/20/2022 16:44:47.6385] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*01/20/2022 16:44:47.6385] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*01/20/2022 16:44:47.7085] wmi_ready_event_rx: WMI UNIFIED READY event
[*01/20/2022 16:44:47.7085] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio
[*01/20/2022 16:44:47.7185] ACS not enabled
[*01/20/2022 16:44:47.7185] ol_ath_thermal_mitigation_attach: --
[*01/20/2022 16:44:47.7185]
[*01/20/2022 16:44:47.7185] __ol_ath_attach() Allocated scn ec480480
[*01/20/2022 16:44:47.7385] ol_ath_attach interface_id 1
[*01/20/2022 16:44:47.7385] Chip id: 0x9, chip version: 0x1000000
[*01/20/2022 16:44:47.7385]
[*01/20/2022 16:44:47.7385] Target Version is 1000000
[*01/20/2022 16:44:47.7385]
[*01/20/2022 16:44:47.7385] Flash Download Address c0000
[*01/20/2022 16:44:47.7385] ol_transfer_bin_file: flash data file defined
[*01/20/2022 16:44:47.7385] Cal location [1]: 00004000
[*01/20/2022 16:44:47.7385]
[*01/20/2022 16:44:47.7385] wifi1 NAND FLASH Select OFFSET 0x5000
[*01/20/2022 16:44:47.7585] qc98xx_verify_checksum: flash checksum passed: 0xc1ff
[*01/20/2022 16:44:47.7585] ol_transfer_bin_file 3979: Download Flash data len 12064
[*01/20/2022 16:44:47.7785]
[*01/20/2022 16:44:47.7785] Board data initialized
[*01/20/2022 16:44:47.8185] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return pa
[*01/20/2022 16:44:47.8185] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1
[*01/20/2022 16:44:47.8185] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/b
[*01/20/2022 16:44:47.8985]
[*01/20/2022 16:44:47.8985] [Flash] : Ignore Module param
[*01/20/2022 16:44:47.8985] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
[*01/20/2022 16:44:47.9285] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
[*01/20/2022 16:44:48.6382] FWLOG: [34785] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:48.6382] FWLOG: [34785] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:48.6382] FWLOG: [34785] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:48.6382] FWLOG: [34785] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:49.0281] HTC Rx: insufficient length, got:4 expected =8
[*01/20/2022 16:44:49.0281] Startup Mode-0 set
[*01/20/2022 16:44:49.0281] HTC Service:0x0300 ep:1 TX flow control disabled
[*01/20/2022 16:44:49.0381] HTC Service:0x0100 ep:2 TX flow control disabled
[*01/20/2022 16:44:49.0381] Firmware_Build_Number:70
[*01/20/2022 16:44:49.0381] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x
[*01/20/2022 16:44:49.0381]
[*01/20/2022 16:44:49.0381] RES CFG Support wmi_service_bitmap 9778
[*01/20/2022 16:44:49.0381]
[*01/20/2022 16:44:49.0381] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
[*01/20/2022 16:44:49.0381] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
[*01/20/2022 16:44:49.1081] wmi_ready_event_rx: WMI UNIFIED READY event
[*01/20/2022 16:44:49.1081] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio
[*01/20/2022 16:44:49.1081] acfg_attach: Offload using existing sock ed68c000
[*01/20/2022 16:44:49.1081] ACS not enabled
[*01/20/2022 16:44:49.1081] ol_ath_thermal_mitigation_attach: --
[*01/20/2022 16:44:49.1481] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*01/20/2022 16:44:49.1481] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
[*01/20/2022 16:44:50.0278] FWLOG: [36165] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:50.0278] FWLOG: [36165] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:50.0278] FWLOG: [36165] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:50.0278] FWLOG: [36165] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
[*01/20/2022 16:44:50.0278] FWLOG: [36173] UNKNOWN 22:55 ( 0x3a, 0x10, 0x0, 0x10, 0x0 )
[*01/20/2022 16:44:50.9275] pid 2464's current affinity mask: 3
[*01/20/2022 16:44:50.9275] pid 2464's new affinity mask: 1
[*01/20/2022 16:44:51.4274] click-config/io-real.click:131: While configuring 'todev_wired0 :: ToDevice':
[*01/20/2022 16:44:51.4274] warning: device 'wired0' is down
[*01/20/2022 16:44:51.4574] click-config/io-real.click:131: While configuring 'fromdev_wired0 :: FromDevice':
[*01/20/2022 16:44:51.4574] warning: device 'wired0' is down
[*01/20/2022 16:44:52.3171] click-config/io-real.click:131: While initializing 'tohost_wired0 :: ToHost':
[*01/20/2022 16:44:52.3171] warning: device 'wired0' is down
[*01/20/2022 16:44:52.7769] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*01/20/2022 16:44:52.7869] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
[*01/20/2022 16:44:53.4967]
[*01/20/2022 16:44:53.4967] Click sched monitor: schedulers = 1
[*01/20/2022 16:44:53.7866] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down
[*01/20/2022 16:44:53.8066] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up
[*01/20/2022 16:44:53.8066] ip6_port srcr6, ip6local fe80::6e71:dff:feec:37a0, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:
[*01/20/2022 16:44:54.1465]
[*01/20/2022 16:44:54.1465] phy_value=0: org="0x1000" phy_reg="0x1000"
[*01/20/2022 16:44:54.5064] wired0: 1000 Mbps Full Duplex
[*01/20/2022 16:44:54.5064]
[*01/20/2022 16:45:06.0428] Loading sha2...
[*01/20/2022 16:45:06.0428] Dumpping sha1...
[*01/20/2022 16:45:07.6024] Loading MIC cert and key
[*01/20/2022 16:45:07.6024] Dumpping sha2...
[*01/20/2022 16:45:09.0919] Loading MIC cert and key
[*01/20/2022 16:45:09.4718] Generating key, this may take a while...
[*01/20/2022 16:45:13.9904] Public key portion is:
[*01/20/2022 16:45:13.9904] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCAZ9WmVwob3hFjBxoEJVThnh5m1MuKhrHOdZvyiG1YUxWSR2Q1daPj5P7ecFGV5UWC1mPWWbtxDg0HBcGrOY2FeOyCQnsIxri8HzrwLpQAhEwGv2cfRuXMGrTbzg/MANm0TmlhLfuAw8HjfMHvHB+JKkx9hID4SM5BVCWI2FsvODfHe9Np//LyFIXBVety6GiLJ5KhLp4IssJrdA+II645db/45LFLo01++cF/ root@m6C710DEC37A0
[*01/20/2022 16:45:13.9904] Fingerprint: sha1!! 2b:5a:d9:7c:61:7b:ef:16:28:33:96:93:32:5d:7f:94:bb:98:ca:dd
[*01/20/2022 16:45:14.0503] pid 3863's current affinity mask: 3
[*01/20/2022 16:45:14.0503] pid 3863's new affinity mask: 1
[*01/20/2022 16:45:14.5102] Password for user changed
[*01/20/2022 16:45:14.6202] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2 -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOLE_49G__/0/g' -e 's/__PRODUCT_ID__/AIR-AP1852I-E-K9/g' -e 's/__AP_TYPE__/48/g' -e 's/__WIRELESS_MAC__/6C:71:0D:ED:15:IRED1_MAC__/6C:71:0D:EC:37:A0/g' | DMALLOC_OPTIONS=debug=0x400003,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000
[*01/20/2022 16:45:16.0197] DOT11_DRV[0]: Init Radio0
[*01/20/2022 16:45:16.0397] DOT11_DRV[0]: Stop Radio0
[*01/20/2022 16:45:16.0497] DOT11_DRV[0]: set_channel Channel set to 6
[*01/20/2022 16:45:16.0597] DOT11_DRV[1]: Init Radio1
[*01/20/2022 16:45:16.0797] DOT11_DRV[1]: Stop Radio1
[*01/20/2022 16:45:16.0897] DOT11_DRV[1]: set_channel Channel set to 36
[*01/20/2022 16:45:16.7195] DOT11_CFG[0] Radio Mode is changed from Local to Local
[*01/20/2022 16:45:16.7195] DOT11_CFG[1] Radio Mode is changed from Local to Local
[*01/20/2022 16:45:16.7395] DOT11_DRV[0]: set_channel Channel set to 1
[*01/20/2022 16:45:16.7395] DOT11_DRV[0]: Channel set to 1, width 20
[*01/20/2022 16:45:16.7395] DOT11_DRV[0]: Channel set to 1, width 20
[*01/20/2022 16:45:16.7595] DOT11_DRV[1]: set_channel Channel set to 36
[*01/20/2022 16:45:16.7595] DOT11_DRV[1]: Channel set to 36, width 20
[*01/20/2022 16:45:16.7695] DOT11_DRV[1]: Channel set to 36, width 20
[*01/20/2022 16:45:20.8382] Waiting for uplink IPv4 configuration
[*01/20/2022 16:45:25.8367] Waiting for uplink IPv4 configuration
[*01/20/2022 16:45:27.4562] ethernet_port wired0, ip 172.31.0.142, netmask 255.255.255.0, gw 172.31.0.1, mtu 1500, bc 0, static_ip_failover false, dhcp_vlan_failover false
[*01/20/2022 16:45:31.9447] DOT11_CFG[0] Radio Mode is changed from Local to Local
[*01/20/2022 16:45:31.9447] DOT11_CFG[1] Radio Mode is changed from Local to Local
[*01/20/2022 16:45:32.0047] AP IPv4 Address updated from 0.0.0.0 to 172.31.0.142
[*01/20/2022 16:45:32.0247] dtls_init: Use MIC certificate
[*01/20/2022 16:45:32.0247]
[*01/20/2022 16:45:32.0247] CAPWAP State: Init
[*01/20/2022 16:45:32.0247]
[*01/20/2022 16:45:32.0247] Config not found, PNP is required, Starting PNP
[*01/20/2022 16:45:32.0247]
[*01/20/2022 16:45:38.6327] PNP:Server not reachable, Start CAPWAP Discovery
[*01/20/2022 16:45:38.6327]
[*01/20/2022 16:45:38.6327] CAPWAP State: Discovery
[*01/20/2022 16:45:38.6327] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:45:38.6427] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:45:38.6427]
[*01/20/2022 16:45:38.6427] CAPWAP State: Discovery
[*01/20/2022 16:45:48.1797]
[*01/20/2022 16:45:48.1797] CAPWAP State: Discovery
[*01/20/2022 16:45:48.1797] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:45:48.1897] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:45:57.6767]
[*01/20/2022 16:45:57.6767] CAPWAP State: Discovery
[*01/20/2022 16:45:57.6767] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:45:57.6867] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:46:07.1837]
[*01/20/2022 16:46:07.1837] CAPWAP State: Discovery
[*01/20/2022 16:46:07.1837] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:46:07.1837] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:46:16.6908]
[*01/20/2022 16:46:16.6908] CAPWAP State: Discovery
[*01/20/2022 16:46:16.6908] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:46:16.7008] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
version
Password: [*01/20/2022 16:47:13.5530] PNP:Server not reachable, Start CAPWAP Discovery
[*01/20/2022 16:47:13.5530]
[*01/20/2022 16:47:13.5530] Lost connection to the controller, going to restart CAPWAP (reason : Post startCapwapDisc
[*01/20/2022 16:47:13.5530]
[*01/20/2022 16:47:13.5530] Restarting CAPWAP State Machine.
[*01/20/2022 16:47:13.6630] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*01/20/2022 16:47:13.6630]
[*01/20/2022 16:47:13.6630] CAPWAP State: DTLS Teardown
Password: [*01/20/2022 16:47:18.4615]
[*01/20/2022 16:47:18.4615] CAPWAP State: Discovery
[*01/20/2022 16:47:18.4615] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:47:18.4715] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
Password:
% Authentication failed
% Authentication failed
User Access Verification
Username: [*01/20/2022 16:47:27.9685]
[*01/20/2022 16:47:27.9685] CAPWAP State: Discovery
[*01/20/2022 16:47:27.9685] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:47:27.9785] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:47:37.4755]
[*01/20/2022 16:47:37.4755] CAPWAP State: Discovery
[*01/20/2022 16:47:37.4755] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:47:37.4855] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:47:46.9726]
[*01/20/2022 16:47:46.9726] CAPWAP State: Discovery
[*01/20/2022 16:47:46.9726] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:47:46.9825] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:47:56.4896]
[*01/20/2022 16:47:56.4896] CAPWAP State: Discovery
[*01/20/2022 16:47:56.4896] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:47:56.4996] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
Username: Cisco
Password:
AP6C71.0DEC.37A0>enable
Password:
AP6C71.0DEC.37A0#version
^
% Invalid input detected at '^' marker.
AP6C71.0DEC.37A0#show
% Incomplete command.
AP6C71.0DEC.37A0#show
% Incomplete command.
AP6C71.0DEC.37A0#capwap
% Incomplete command.
AP6C71.0DEC.37A0#[*01/20/2022 16:48:54.3215] PNP:Server not reachable, Start CAPWAP Discovery
[*01/20/2022 16:48:54.3215]
[*01/20/2022 16:48:54.3215] Lost connection to the controller, going to restart CAPWAP (reason : Post startCapwapDiscovery)...
[*01/20/2022 16:48:54.3215]
[*01/20/2022 16:48:54.3215] Restarting CAPWAP State Machine.
[*01/20/2022 16:48:54.4315] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*01/20/2022 16:48:54.4315]
[*01/20/2022 16:48:54.4315] CAPWAP State: DTLS Teardown
[*01/20/2022 16:48:59.2200]
[*01/20/2022 16:48:59.2200] CAPWAP State: Discovery
[*01/20/2022 16:48:59.2300] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:48:59.2300] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:49:08.7170]
[*01/20/2022 16:49:08.7170] CAPWAP State: Discovery
[*01/20/2022 16:49:08.7270] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:49:08.7270] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:49:18.2240]
[*01/20/2022 16:49:18.2240] CAPWAP State: Discovery
[*01/20/2022 16:49:18.2240] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:49:18.2340] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:49:27.7311]
[*01/20/2022 16:49:27.7311] CAPWAP State: Discovery
[*01/20/2022 16:49:27.7311] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:49:27.7411] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*01/20/2022 16:49:37.2381]
[*01/20/2022 16:49:37.2381] CAPWAP State: Discovery
[*01/20/2022 16:49:37.2381] IP DNS query for CISCO-CAPWAP-CONTROLLER.home.arpa
[*01/20/2022 16:49:37.2481] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
Bitte markiere auch die Kommentare, die zur Lösung des Beitrags beigetragen haben
Content-ID: 62366301716
Url: https://administrator.de/contentid/62366301716
Ausgedruckt am: 19.12.2024 um 07:12 Uhr
10 Kommentare
Neuester Kommentar
Aquis Anleitung nicht nutzen kann.
Das ist fast richtig, denn die gilt nur für die non Mobility Express Modelle.Die klassischen Cisco IOS Kommandos zum Management wie z.B. show run usw. um die aktuelle Konfig zu zeigen gelten natürlich hier auch uneingeschränkt. Nur "show" reicht übrigens nicht.
Die Mobility Express Firmware findest du über diesen Link:
https://software.cisco.com/download/home/286285803/type
Bedenke hier das du zuerst immer die "Conversion Firmware" Cisco 1850 Series Mobility Express Release 8.10 Software,to be used for conversion from Lightweight Access Points only einspielen musst wenn du wie in deinem Falle von einem AP der nur die reine Lightweight Firmware nutzt auf einen mit Mobility Express wechseln willst!!! Mit CLI Access geht es auch direkt:
https://www.cisco.com/c/en/us/td/docs/wireless/access_point/mob_exp/810/ ...
(Kapitel: "Checking if an AP has CAPWAP Lightweight AP Software or Cisco Mobility Express Software" und Folgendes)
https://www.cisco.com/c/de_de/support/docs/wireless/mobility-express-air ...
Danach datest du dann auf die finale Version von Mobility Express up. Du kannst das auch an der Größe der Images erkennen. Diese Reihenfolge muss eingehalten werden.
Welches Image du aktuell verwendest zeigt dir das Kommando sh ver. (Siehe auch ME Cisco User Guide oben)
Ist es eine 15.x.y Version (ap1g4-k9w8-tar.153-3.JPS.tar Image) dann ist es die LWAPP Firmware die einen externen Controller erzwingt. Deshalb hast du auch kein Web GUI auf deinem AP!
Das aktuelle Mobility Express Image für die APs hat die Versionsnummer 8.10.196.0.
"show run" funktioniert nicht oder ich mache was falsch.
Ja machst du leider!! Logischerweise laufen solche Kommandos die die Konfig anzeigen nur im "Admin" Mode, sprich dem privileged Mode! Das ist bei anderen Herstellern bekanntlich auch immer so. In den Priv. Mode gelangst du wenn du ein ena (enable) eingibst!!
Der CLI Prompt wird dann immer zu einem # statt des ">". Am # Prompt kannst du immer erkennen das du im Admin / Privileged Mode bist! Guckst du auch hier:
https://www.coufal.info/cisco_ios/basis.shtml
Wie kann ich feststellen ob ich das Lightweight Image oder das Mobility Express?
Wie dir mehrfach oben schon beschrieben wurde mit show versionDeine Version 8.5.182.0 ist eine alte Mobility Express Firmware Version wie du an der Firmware Historie der ME Images im Cisco Portal ja unschwer auch selber erkennen kannst:
https://software.cisco.com/download/home/286288455/type/286289839/releas ...
Das LWAPP Image hat eine völlige andere Release Nummer und ist damit eindeutig vom ME Image zu unterscheiden. Stand oben aber auch schon alles...
Mit anderen Worten: Du hast ein ME Image und kannst deine uralt 8.5er Version direkt auf die aktuelle 8.10er updaten! 😉
Danach gibst du ein write erase oder auch ein era startup-config ein (⚠️ Priv.Mode natürlich) und lädst damit die Default Settings auf den APs wo dann auch das Web GUI aktiv ist.
Danach nimmst du einen einzigen AP online und konfigurierst den mit deinen WLAN Settings wie du es haben möchtest. Dieser AP wird dann automatisch Master. (Siehe Cisco Userguide von oben, lesen hilft!)
Erst danach klemmst du dann die anderen APs an. Diese ziehen sich dann ganz automatisch die Konfiguration vom Master. Der Master AP ist dann auch dein zentraler Controller für alle Änderungen im WLAN.
Achte beim Setup darauf das du keine aktive WLAN SSID auf das Management Netz mappst! Das sollte man bekanntlich nie in ein WLAN exponieren, sondern sollte aus Sicherheitsgründen immer nur per Kupfer zugänglich sein!
Sorry mit dem fehlerhaften Kommandos zum Factory Reset. Bei den 1852I ist das etwas anders:
https://community.cisco.com/t5/wireless/resetting-an-aironet-1852i/td-p/ ...
Kapitel: "Updating Cisco Mobility Express Network using CLI
Gibt auch einen Knowledgebase Artikel dazu:
https://community.cisco.com/t5/wireless/aironet-1850-mobility-express-up ...
Man findet auch im Web und bei YouTube entsprechende Anleitungen.
https://www.wiresandwi.fi/blog/cisco-mobility-express-software-upgrade
https://www.youtube.com/watch?v=X9GRWbsVAT4
https://community.cisco.com/t5/wireless/resetting-an-aironet-1852i/td-p/ ...
Ich habe dann probiert über die Console das Image per TFTP abzurufen.
Das geht so nicht. Via CLI sind ein paar mehr Kommandos nötig. Wichtig ist das du das ZIP File zuerst im TFTP Root Verzeichnis entzippst.Wie mache ich hier am besten weiter?
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-2/ ...Kapitel: "Updating Cisco Mobility Express Network using CLI
Gibt auch einen Knowledgebase Artikel dazu:
https://community.cisco.com/t5/wireless/aironet-1850-mobility-express-up ...
Man findet auch im Web und bei YouTube entsprechende Anleitungen.
https://www.wiresandwi.fi/blog/cisco-mobility-express-software-upgrade
https://www.youtube.com/watch?v=X9GRWbsVAT4