SHARE
TWEET

Log

3de Oct 3rd, 2017 958 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. (Cisco Controller)
  2.  
  3. Enter User Name (or 'Recover-Config' this one-time only to reset configuration to factory defaults)
  4.  
  5. User:  Recover-ConfigInitiating system recovery process... please wait
  6.  
  7. Rebooting system
  8.  
  9. Cleaning up Provisioning SSID
  10. Applying mgmt ip addr 192.168.188.43 netmask 255.255.255.0 gateway 192.168.188.1
  11.  
  12. As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled
  13. As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled
  14.  
  15. Password:
  16.  
  17. Writing reload timestamp (Tue Oct  3 21:58:46 UTC 2017) to disk
  18.  
  19.  
  20.  
  21. [10/03/2017 21:58:48.1985] UBIFS: un-mount UBI device 0, volume 3
  22. [10/03/2017 21:58:49.0882] Restarting system.
  23. [10/03/2017 21:58:49.1282] Going down for restart now
  24.  
  25.  
  26. U-Boot 2012.07 (btldr release 30) (Mar 03 2017 - 19:13:24)
  27.  
  28. This product contains some software licensed under the
  29. "GNU General Public License, version 2" provided with
  30. ABSOLUTELY NO WARRANTY under the terms of
  31. "GNU General Public License, version 2", available here:
  32. http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
  33.  
  34. DRAM:  1 GiB
  35. NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
  36. SF: Detected Macronix MX25U3235F [4 MiB]
  37. MFG data loaded
  38. Scanning shenv data blocks
  39. Total valid parts=4
  40. Active shenv part[1:1], write_counter=32
  41. PCI1 Link Intialized
  42. Net:
  43. PHY ID = 0x4dd074, eth0 found AR8033 PHY
  44. PHY ID = 0x4dd074, eth1 found AR8033 PHY
  45. Valid I2C chip addresses: 51 52
  46. AP 1832/1852 detected...
  47. Power Type: Power Brick detected...
  48. Signature returns 0
  49. BL signing verification success, continue to run...
  50. Auto boot mode, use bootipq directly
  51. Hit ESC key to stop autoboot:  0
  52. Specified BOOT: part2
  53.  
  54. Booting from part2
  55.  
  56. Read 1024 bytes from volume part2 to 45000000
  57. Read 44088764 bytes from volume part2 to 45000000
  58. Signature returns 0
  59. Image signing verification success, continue to run...
  60. Using machid 0x1260 from environment
  61.  
  62. Starting image ...
  63.  
  64. [01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
  65. [01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
  66. [01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
  67. [01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
  68. [01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0
  69. [01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
  70. [01/01/1970 00:00:00.2200]
  71. [01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
  72. [01/01/1970 00:00:28.0914] ACPU PVS: 1
  73. [01/01/1970 00:00:30.5706] buginf tty flushing thread started, ttyport=eec1e490
  74. [*01/01/1970 00:00:36.8287] buginf() enabled.
  75. [*01/01/1970 00:00:36.8387] Made it into bootsh: Jul 25 2017 06:10:53
  76. [*01/01/1970 00:00:36.8387] bootsh build T-60aee86da0fbfc5e21adb4dca12820dd61e40010-g60aee86d-vipendya
  77.  
  78. Welcome to Cisco.
  79.  
  80. Usage of this device is governed by Cisco's End User License Agreement,
  81. available at:
  82. http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.
  83.  
  84.  
  85.              Restricted Rights Legend
  86.  
  87. Use, duplication, or disclosure by the Government is subject to
  88. restrictions as set forth in subparagraph (c) of the Commercial
  89. Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
  90. subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
  91. Software clause at DFARS sec. 252.227-7013.
  92.  
  93.             Cisco Systems, Inc.
  94.             170 West Tasman Drive
  95.             San Jose, California 95134-1706
  96.  
  97. This product contains cryptographic features and is subject to United
  98. States and local country laws governing import, export, transfer and
  99. use. Delivery of Cisco cryptographic products does not imply
  100. third-party authority to import, export, distribute or use encryption.
  101. Importers, exporters, distributors and users are responsible for
  102. compliance with U.S. and local country laws. By using this product you
  103. agree to comply with applicable laws and regulations. If you are unable
  104. to comply with U.S. and local laws, return this product immediately.
  105.  
  106. A summary of U.S. laws governing Cisco cryptographic products may be found at:
  107. http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
  108.  
  109. If you require further assistance please contact us by sending email to
  110. export@cisco.com.
  111.  
  112.  
  113. This product contains some software licensed under the
  114. "GNU General Public License, version 2" provided with
  115. ABSOLUTELY NO WARRANTY under the terms of
  116. "GNU General Public License, version 2", available here:
  117. http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
  118.  
  119.  
  120. This product contains some software licensed under the
  121. "GNU Library General Public License, version 2" provided
  122. with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
  123. General Public License, version 2", available here:
  124. http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html
  125.  
  126.  
  127. This product contains some software licensed under the
  128. "GNU Lesser General Public License, version 2.1" provided
  129. with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
  130. General Public License, version 2.1", available here:
  131. http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
  132.  
  133.  
  134. This product contains some software licensed under the
  135. "GNU General Public License, version 3" provided with
  136. ABSOLUTELY NO WARRANTY under the terms of
  137. "GNU General Public License, Version 3", available here:
  138. http://www.gnu.org/licenses/gpl.html.
  139.  
  140.  
  141. This product contains some software licensed under the
  142. "GNU Affero General Public License, version 3" provided
  143. with ABSOLUTELY NO WARRANTY under the terms of
  144. "GNU Affero General Public License, version 3", available here:
  145. http://www.gnu.org/licenses/agpl-3.0.html.
  146.  
  147. init started: BusyBox v1.23.2 (2017-07-25 05:54:15 PDT)
  148. [*01/01/1970 00:00:40.1776] GCM-128 POST passed
  149. [*01/01/1970 00:00:40.1776] GCM-256 POST passed
  150. [*01/01/1970 00:00:40.4975] Active version: 8.5.103.0
  151. [*01/01/1970 00:00:40.4975] Backup version: 8.4.100.0
  152. Jan  1 00:00:40 FIPS[1572]: *** shell: FIPS Mode = disabled ***
  153. [*01/01/1970 00:00:40.7374]
  154. [*01/01/1970 00:00:40.7374]  led pattern module start
  155. [*01/01/1970 00:00:40.8074] AP1852I
  156.  
  157.  
  158.  
  159. User Access Verification
  160. Username: [*01/01/1970 00:00:40.9174] nss_driver - Turbo Support 1
  161. [*01/01/1970 00:00:40.9174] Supported Frequencies - 110Mhz 550Mhz 733Mhz
  162. [*01/01/1970 00:00:40.9574] NSS firmware booted
  163. [*01/01/1970 00:00:40.9774] NSS firmware booted
  164. [*01/01/1970 00:00:41.4772] Current value of FACTORY_RESET=0
  165. [*01/01/1970 00:00:41.4972] Last reload time: Oct 3 21:58:46 2017
  166. [*10/03/2017 21:58:46.0000] Setting system time Tue Oct  3 21:58:46 UTC 2017
  167. [*10/03/2017 21:58:46.0699] device wired0 entered promiscuous mode
  168. [*10/03/2017 21:58:46.1499] device wired1 entered promiscuous mode
  169. [*10/03/2017 21:58:46.5898] stile module dp init successfully
  170. [*10/03/2017 21:58:46.5898] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR VERSION:module build date: Jul 25 2017 at 06:08:35
  171. [*10/03/2017 21:58:47.2696] miibus get eec93c00!
  172. [*10/03/2017 21:58:47.3096]
  173. [*10/03/2017 21:58:47.3196] boot 685 build T-60aee86da0fbfc5e21adb4dca12820dd61e40010-g60aee86d-vipendya board corsica mac C4:B9:CD:F4:3B:38
  174. [*10/03/2017 21:58:47.3196] Module: mbedtls  .text=0xbf000000        data=0xbf007e18        bss=0xbf008070
  175. [*10/03/2017 21:58:47.3196] Module: aptrace  .text=0xbf00c000        data=0xbf0186e0        bss=0xbf018b70
  176. [*10/03/2017 21:58:47.3196] Module: led_module  .text=0xbf020000        data=0xbf0204e0        bss=0xbf020b48
  177. [*10/03/2017 21:58:47.3196] Module: qca_nss_gmac  .text=0xbf024000        data=0xbf02ac00        bss=0xbf02b0c4
  178. [*10/03/2017 21:58:47.3196] Module: qca_nss_drv  .text=0xbf034000        data=0xbf04fab8        bss=0xbf050868
  179. [*10/03/2017 21:58:47.3196] Module: qca_nss_capwapmgr  .text=0xbf071000        data=0xbf075a98        bss=0xbf075be8
  180. [*10/03/2017 21:58:47.3196] Module: nssmgrctl  .text=0xbf07c000        data=0xbf07d70c        bss=0xbf07da30
  181. [*10/03/2017 21:58:47.3196] Module: proclikefs  .text=0xbf083000        data=        bss=0xbf083b40
  182. [*10/03/2017 21:58:47.3196] Module: stile_lm_ft  .text=        data=        bss=
  183. [*10/03/2017 21:58:47.3196] Module: stile_lm_dp  .text=        data=        bss=
  184. [*10/03/2017 21:58:47.3196] Module: ipv6  .text=0xbf9ef000        data=0xbfa20080        bss=0xbfa2192c
  185. [*10/03/2017 21:58:47.3196] Module: bonding  .text=0xbfa3b000        data=0xbfa4c664        bss=0xbfa4ca90
  186. [*10/03/2017 21:58:47.3196] Module: lowmemorykiller  .text=0xbfa59000        data=0xbfa592c0        bss=0xbfa5944c
  187. [*10/03/2017 21:58:47.3196] Module: qca_nss_profile_drv  .text=0xbfa5d000        data=0xbfa5e320        bss=0xbfa5e494
  188. [*10/03/2017 21:58:47.3196] Module: scsi_wait_scan  .text=        data=        bss=
  189. [*10/03/2017 21:58:47.3196] Module: ssdk_reg  .text=0xbfa67000        data=        bss=0xbfa67838
  190. [*10/03/2017 21:58:47.8094] Last reload reason : 1: reload command
  191. [*10/03/2017 21:58:49.4089] __mm_init_module
  192. [*10/03/2017 21:58:49.4589]
  193. [*10/03/2017 21:58:49.4589] __ol_ath_attach() Allocated scn ed1c0480
  194. [*10/03/2017 21:58:49.4689] ol_ath_attach interface_id 0
  195. [*10/03/2017 21:58:49.4689] Chip id: 0x9, chip version: 0x1000000
  196. [*10/03/2017 21:58:49.4689]
  197. [*10/03/2017 21:58:49.4689]  Target Version is 1000000
  198. [*10/03/2017 21:58:49.4689]
  199. [*10/03/2017 21:58:49.4689]  Flash Download Address  c0000
  200. [*10/03/2017 21:58:49.4689] ol_transfer_bin_file: flash data file defined
  201. [*10/03/2017 21:58:49.4689] Cal location [0]: 00000000
  202. [*10/03/2017 21:58:49.4689]
  203. [*10/03/2017 21:58:49.4689]  Wifi0 NAND FLASH Select OFFSET 0x1000
  204. [*10/03/2017 21:58:49.4889] qc98xx_verify_checksum: flash checksum passed: 0xeb1f
  205. [*10/03/2017 21:58:49.4889] ol_transfer_bin_file 3946: Download Flash data len 12064
  206. [*10/03/2017 21:58:49.5089]
  207. [*10/03/2017 21:58:49.5089]  Board data initialized
  208. [*10/03/2017 21:58:49.5589] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660
  209. [*10/03/2017 21:58:49.5589] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1
  210. [*10/03/2017 21:58:49.5589] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin
  211. [*10/03/2017 21:58:49.6389]
  212. [*10/03/2017 21:58:49.6389]  [Flash] : Ignore Module param
  213. [*10/03/2017 21:58:49.6389] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0
  214. [*10/03/2017 21:58:49.6589] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin
  215. [*10/03/2017 21:58:50.7685] HTC Rx: insufficient length, got:4 expected =8
  216. [*10/03/2017 21:58:50.7685] Startup Mode-0 set
  217. [*10/03/2017 21:58:50.7685] HTC Service:0x0300 ep:1 TX flow control disabled
  218. [*10/03/2017 21:58:50.7685] HTC Service:0x0100 ep:2 TX flow control disabled
  219. [*10/03/2017 21:58:50.7685] Firmware_Build_Number:70
  220. [*10/03/2017 21:58:50.7685] num_rf_chain:0x00000004  ht_cap_info:0x0000185b  vht_cap_info:0x339a79b2  vht_supp_mcs:0x0000ffaa
  221. [*10/03/2017 21:58:50.7685]
  222. [*10/03/2017 21:58:50.7685]  RES CFG Support wmi_service_bitmap 9778
  223. [*10/03/2017 21:58:50.7685]
  224. [*10/03/2017 21:58:50.7685]  Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT
  225. [*10/03/2017 21:58:50.7685] ol_ath_service_ready_event: sw_cal_support_check_flag: 1
  226. [*10/03/2017 21:58:50.8485] wmi_ready_event_rx:  WMI UNIFIED READY event
  227. [*10/03/2017 21:58:50.8485] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0
  228. [*10/03/2017 21:58:50.8485] ACS not enabled
  229. [*10/03/2017 21:58:50.8485] ol_ath_thermal_mitigation_attach: --
  230. [*10/03/2017 21:58:50.8885]  pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16
  231. [*10/03/2017 21:58:51.7682] FWLOG: [47103] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0x1e, 0x94c, 0x94c, 0x0 )
  232. [*10/03/2017 21:58:51.7682] FWLOG: [47103] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )
  233. [*10/03/2017 21:58:51.7682] FWLOG: [47103] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )
  234. [*10/03/2017 21:58:51.7682] FWLOG: [47103] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )
  235. [*10/03/2017 21:58:54.1375] pid 2437's current affinity mask: 3
  236. [*10/03/2017 21:58:54.1375] pid 2437's new affinity mask: 1
  237. [*10/03/2017 21:58:54.2174] click-config/io-real.click:131: While configuring 'todev_wired0 :: ToDevice':
  238. [*10/03/2017 21:58:54.2174]   warning: device 'wired0' is down
  239. [*10/03/2017 21:58:54.3074] click-config/io-real.click:131: While configuring 'fromdev_wired0 :: FromDevice':
  240. [*10/03/2017 21:58:54.3074]   warning: device 'wired0' is down
  241. [*10/03/2017 21:58:55.6870] click-config/io-real.click:131: While initializing 'tohost_wired0 :: ToHost':
  242. [*10/03/2017 21:58:55.6870]   warning: device 'wired0' is down
  243. [*10/03/2017 21:58:56.5267]
  244. [*10/03/2017 21:58:56.5267] Click sched monitor: schedulers = 1
  245. [*10/03/2017 21:58:57.6264] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000
  246. [*10/03/2017 21:58:59.3358] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down
  247. [*10/03/2017 21:58:59.3658] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up
  248. [*10/03/2017 21:58:59.3658] ip6_port srcr6, ip6local fe80::c6b9:cdff:fef4:3b38, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 3(slaac)
  249. [*10/03/2017 21:58:59.7457]
  250. [*10/03/2017 21:58:59.7457] phy_value=0: org="0x1000" phy_reg="0x1000"
  251. [*10/03/2017 21:59:00.6055] wired0: 1000 Mbps Full Duplex
  252. [*10/03/2017 21:59:00.6055]
  253. [*10/03/2017 21:59:10.2825] Loading sha2...
  254. [*10/03/2017 21:59:10.2825] Dumpping sha1...
  255. [*10/03/2017 21:59:12.0019] Loading MIC cert and key
  256. [*10/03/2017 21:59:12.0019] Dumpping sha2...
  257. [*10/03/2017 21:59:13.7214] Loading MIC cert and key
  258. [*10/03/2017 21:59:14.1013] Generating key, this may take a while...
  259. [*10/03/2017 21:59:15.1509] Public key portion is:
  260. [*10/03/2017 21:59:15.1509] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCU0kFDWlydoMtxFtmV3ypTfkgTYqvYTM14XZo9ozaHinYv3pepeN3/czbnVll5II9VzbRJgISsg115aGt+DxClPw8mR7vWHERESuaYeeCXzGzlJLTZws4FHn6I8ogTsTC2vMRulA9h/BWXmtU6Evji4D3kBJpmjyxko61mlPolWvyBj89YxIOu0q9YLZ+FQXmyvabtn6w3PY9/W+rf29OGnRr+k7DKEe9yrdbDQ0FJ6ufI7jZDI9p3+r6MMN9zdgRDq3e1/u+1eFYZl4VrKmzfyldnZoQ+LCLlY12BWnICeCwqGr0RxitX/J0KfGYWcGr+AjINd6wKl1x2e/8BP8Ol root@mC4B9CDF43B38
  261. [*10/03/2017 21:59:15.1509] Fingerprint: md5 73:fe:cb:88:57:f6:7e:3a:a4:28:f1:f1:e3:2d:97:f6
  262. [*10/03/2017 21:59:15.2109] pid 3672's current affinity mask: 3
  263. [*10/03/2017 21:59:15.2109] pid 3672's new affinity mask: 1
  264. [*10/03/2017 21:59:15.6708] Password for 'Cisco' changed
  265. [*10/03/2017 21:59:15.8007] gzip -dc /etc/wcp.usermodule.template.gz | sed  -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/1/g' -e 's/__DOMAIN_5G__/12/g' -e 's/__PWR_TABLE_49G__/0/g' -e 's/__PRODUCT_ID__/AIR-AP1852E-E-K9/g' -e 's/__AP_TYPE__/47/g' -e 's/__WIRELESS_MAC__/C4:B9:CD:F5:4D:00/g' -e 's/__WIRED_MAC__/C4:B9:CD:F4:3B:38/g' -e 's/__WIRED1_MAC__/C4:B9:CD:F4:3B:38/g' | DMALLOC_OPTIONS=debug=0x400003,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
  266. [*10/03/2017 21:59:17.2703] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX failed for apr1v0 error No such device
  267. [*10/03/2017 21:59:17.2703] wcpd: /local/BUILD/workspace/85_ME_CCO_Build-rebuild/c8_5_throttle_250717053637/router/base/../elts-meraki/elements/wcp/wcp_db.cc: 1441: void WcpDb::populate_if_index_table(): Assertion `if_index >= 0 && if_index < 64' failed.
  268. [*10/03/2017 21:59:20.9391] ethernet_port wired0, ip 192.168.188.28, netmask 255.255.255.0, gw 192.168.188.1, mtu 1500, bcast 192.168.188.255, dns1 192.168.188.1, domain fritz.box, vid 0, static_ip_failover false, dhcp_vlan_failover false
  269. [*10/03/2017 21:59:31.2259] AP IPv4 Address updated from 0.0.0.0 to 192.168.188.28
  270. [*10/03/2017 21:59:51.4396]
  271. [*10/03/2017 21:59:51.4396] !!!!! {watchdogd} Process wcpd gone for 60s
  272. [*10/03/2017 21:59:51.4396]
  273. [*10/03/2017 21:59:51.4396] !!!!! {watchdogd} Process capwapd no heartbeat for 60s
  274. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  275. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  276. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  277. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  278. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  279. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  280. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  281. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  282. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  283. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  284. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  285. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  286. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  287. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  288. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  289. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  290. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  291. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  292. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  293. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  294. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  295. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  296. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  297. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  298. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  299. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  300. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  301. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  302. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  303. [*10/03/2017 22:00:15.9519] waiting for WCP to initialize
  304. [*10/03/2017 22:00:15.9519] Socket Invalid Element wcp/wcp_db Handler has_rlan Data 0 Length 10
  305. [*10/03/2017 22:00:15.9519] Failed to load flex AP config from file. Default config will be used.
  306. [*10/03/2017 22:00:16.0619] /usr/bin/cisco_core.sh: Corefile /storage/cores//APC4B9.CDF4.3B38__core-wcpd.8.5.103.0.2017-10-03-21-16-22.tgz deleted.
  307. [*10/03/2017 22:00:56.4893]
  308. [*10/03/2017 22:00:56.4893] !!!!! {watchdogd} Process wcpd gone for 120s
  309. [*10/03/2017 22:02:01.5389]
  310. [*10/03/2017 22:02:01.5389] !!!!! {watchdogd} Process wcpd gone for 180s
  311. [*10/03/2017 22:02:06.6473]
  312. [*10/03/2017 22:02:06.6473] !!!!! {/usr/bin/capwap_brain} failed writing /click/gw_h/nat/firewall_ssh_sw/sw len 1 data: "0"
  313. [*10/03/2017 22:02:06.6573] chatter: tohost_virtual :: ToHost: device 'virtual' went down
  314. [*10/03/2017 22:02:06.6673] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down
  315. [*10/03/2017 22:02:06.6673] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down
  316. [*10/03/2017 22:02:06.6773]
  317. Cryptographic library self-test....
  318. Testing SHA1 Short Message 1
  319. Testing SHA256 Short Message 1
  320. Testing SHA384 Short Message 1
  321. SHA1 POST PASSED
  322. Testing HMAC SHA1 Short Message 1
  323. Testing HMAC SHA2 Short Message 1
  324. Testing HMAC SHA384 Short Message 1
  325. passed!
  326.  
  327. XML config selected
  328. Validating XML configuration
  329. Cisco is a trademark of Cisco Systems, Inc.
  330. Software Copyright Cisco Systems, Inc. All rights reserved.
  331.  
  332. Cisco AireOS Version 8.5.103.0
  333. Initializing OS Services: ok
  334. Initializing Serial Services: ok
  335. Initializing Network Services: ok
  336. Starting SSHD: ok
  337. Starting PNP: ok
  338. Starting Statistics Service: ok
  339. Starting ARP Services: ok
  340. Starting Trap Manager: ok
  341. Starting Network Interface Management Services: ok
  342. Starting System Services:
  343. As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled
  344. As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled
  345. ok
  346. Starting SNMP services: ok
  347. Starting Fastpath Hardware Acceleration: ok
  348. Starting Switching Services: ok
  349. Starting QoS Services: ok
  350. Starting Policy Manager: ok
  351. Starting Data Transport Link Layer: ok
  352. Starting Access Control List Services: ok
  353. Starting System Interfaces:
  354. As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled
  355. As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled
  356. ok
  357. Starting Client Troubleshooting Service: ok
  358. Starting Certificate Database: ok
  359. Starting VPN Services: ok
  360. Starting Management Frame Protection: ok
  361. Starting DNS Services: ok
  362. ok
  363. Starting LWAPP: ok
  364. Starting CAPWAP: ok
  365. Starting LOCP: ok
  366. Starting Security Services: ok
  367. Starting Policy Manager: ok
  368. Starting Authentication Engine: ok
  369. Starting Capwap Ping Component: ok
  370. Starting AVC Services: ok
  371. Starting AVC Flex Services: ok
  372. Starting Virtual AP Services: ok
  373. Starting AireWave Director: ok
  374. Starting Network Time Services: ok
  375. Starting Cisco Discovery Protocol: ok
  376. Starting Broadcast Services: ok
  377. Starting Logging Services: ok
  378. Starting DHCP Server: ok
  379. Starting IDS Signature Manager: ok
  380. Starting RFID Tag Tracking: ok
  381. Starting RF Profiles: ok
  382. Starting Mesh Services:  ok
  383. Starting TSM: ok
  384. Starting CIDS Services: ok
  385. Starting Ethernet-over-IP: ok
  386. Starting DTLS server:  enabled in CAPWAP
  387. Starting CleanAir: ok
  388. Starting WIPS: ok
  389. Starting SSHPM LSC PROV LIST: ok
  390. Starting RRC Services: ok
  391. Starting SXP Services: ok
  392. Starting Alarm Services: ok
  393. Starting FMC HS: ok
  394. Starting FLEXEXPRESS ConfigSync Task: ok
  395. Starting HTTP Image Download Task: ok
  396. Starting Tunnel Services New: ok
  397. Starting Portal Server Services: ok
  398. Starting Management Services:
  399.    Web Server:    CLI:    Secure Web: ok
  400. Starting IPSec Profiles component: ok
  401.  
  402. Enabling Controller Provisioning
  403.  Configuring management interface
  404. Cleaning up Provisioning SSID
  405. Applying mgmt ip addr 192.168.188.43 netmask 255.255.255.0 gateway 192.168.188.1
  406.  
  407. As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled
  408. As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled
  409.  
  410.  Enabling mgmt via wireless
  411.  Enabling Provisioning SSID
  412.  SSID: CiscoAirProvision, Admin Status: 1, Interface Name: management, 802.11 Auth: WPA2-PSK,  Wi-Fi Protected Access : Enabled
  413.  
  414. (Cisco Controller)
  415.  
  416. Cisco Aironet 1850 Series Mobility Express
  417. Welcome to the Cisco Wizard Configuration Tool
  418. Use the '-' character to backup
  419.  
  420.  
  421. Would you like to terminate autoinstall? [yes]:
  422.  Warning: Missing TFTP/CCO params, Please Configure the Image Download Params
  423. Oct  3 22:07:38 apsw_watchdog: secs_no_fastcgi: 0
  424.  
  425. Oct  3 22:07:38 apsw_watchdog: secs_no_kclick: 0
  426.  
  427. Oct  3 22:07:38 apsw_watchdog: secs_no_klogd: 0
  428.  
  429. Oct  3 22:07:38 apsw_watchdog: secs_no_led_app: 0
  430.  
  431. Oct  3 22:07:38 apsw_watchdog: secs_no_switchdrvr: 0
  432.  
  433. Oct  3 22:07:38 apsw_watchdog: secs_no_sxpd: 0
  434.  
  435. Oct  3 22:07:38 apsw_watchdog: secs_no_lighttpd: 0
  436.  
  437. Oct  3 22:07:38 apsw_watchdog: secs_no_slowfcgi: 0
  438.  
  439. Oct  3 22:07:38 apsw_watchdog: secs_no_sync_log: 0
  440.  
  441. Oct  3 22:07:38 apsw_watchdog: secs_no_syslogd: 0
  442.  
  443. Oct  3 22:07:38 apsw_watchdog: secs_no_hostapd: 0
  444.  
  445. Oct  3 22:07:38 apsw_watchdog: secs_no_gateway: 0
  446.  
  447. Oct  3 22:07:38 apsw_watchdog: secs_no_dnsmasq: 0
  448.  
  449. Oct  3 22:07:38 apsw_watchdog: secs_no_xmit_mon0: 0
  450.  
  451. Oct  3 22:07:38 apsw_watchdog: secs_no_xmit_mon1: 0
  452.  
  453. Oct  3 22:07:38 apsw_watchdog: secs_no_xmit_mon2: 0
  454.  
  455. Oct  3 22:07:38 apsw_watchdog: secs_absent_mon0: 0
  456.  
  457. Oct  3 22:07:38 apsw_watchdog: secs_absent_mon1: 0
  458.  
  459. Oct  3 22:07:38 apsw_watchdog: secs_watchdog_running: 520
  460.  
  461. Oct  3 22:07:38 apsw_watchdog: freemem: 583032832
  462.  
  463. Oct  3 22:07:38 apsw_watchdog: ticks: 104
  464.  
  465.  
  466.  
  467. Writing reload timestamp (Tue Oct  3 22:07:43 UTC 2017) to disk
  468.  
  469.  
  470.  
  471. [10/03/2017 22:07:45.3915] UBIFS: un-mount UBI device 0, volume 3
  472. [10/03/2017 22:07:46.2812] Restarting system.
  473. [10/03/2017 22:07:46.3112] Going down for restart now
  474.  
  475.  
  476. U-Boot 2012.07 (btldr release 30) (Mar 03 2017 - 19:13:24)
  477.  
  478. This product contains some software licensed under the
  479. "GNU General Public License, version 2" provided with
  480. ABSOLUTELY NO WARRANTY under the terms of
  481. "GNU General Public License, version 2", available here:
  482. http://www.gnu.org/licenses/old-licenses/gpl-2.0.html
  483.  
  484. DRAM:  1 GiB
  485. NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
  486. SF: Detected Macronix MX25U3235F [4 MiB]
  487. MFG data loaded
  488. Scanning shenv data blocks
  489. Total valid parts=4
  490. Active shenv part[1:1], write_counter=32
  491. PCI1 Link Intialized
  492. Net:
  493. PHY ID = 0x4dd074, eth0 found AR8033 PHY
  494. PHY ID = 0x4dd074, eth1 found AR8033 PHY
  495. Valid I2C chip addresses: 51 52
  496. AP 1832/1852 detected...
  497. Power Type: Power Brick detected...
  498. Signature returns 0
  499. BL signing verification success, continue to run...
  500. Auto boot mode, use bootipq directly
  501. Hit ESC key to stop autoboot:  0
  502. Specified BOOT: part2
  503.  
  504. Booting from part2
  505.  
  506. Read 1024 bytes from volume part2 to 45000000
  507. Read 44088764 bytes from volume part2 to 45000000
  508. Signature returns 0
  509. Image signing verification success, continue to run...
  510. Using machid 0x1260 from environment
  511.  
  512. Starting image ...
  513.  
  514. [01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d
  515. [01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache
  516. [01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point
  517. [01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc
  518. [01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0
  519. [01/01/1970 00:00:00.1500] CPU1: Booted secondary processor
  520. [01/01/1970 00:00:00.2200]
  521. [01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3
  522. [01/01/1970 00:00:27.4316] ACPU PVS: 1
  523. [01/01/1970 00:00:29.9208] buginf tty flushing thread started, ttyport=ef45e490
  524. [*01/01/1970 00:00:36.2188] buginf() enabled.
  525. [*01/01/1970 00:00:36.2288] Made it into bootsh: Jul 25 2017 06:10:53
  526. [*01/01/1970 00:00:36.2288] bootsh build T-60aee86da0fbfc5e21adb4dca12820dd61e40010-g60aee86d-vipendya
  527.  
  528. Welcome to Cisco.
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top