<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New AP’s not joining the vSZ/SZ due to expired AP certificate in RUCKUS Self-Help</title>
    <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/New-AP-s-not-joining-the-vSZ-SZ-due-to-expired-AP-certificate/m-p/44240#M15</link>
    <description>&lt;P&gt;As a Sr. Technical Support Engineer, I have encountered this issue and would like to share my experience here:&lt;/P&gt;
&lt;P&gt;On the controller firmware version 3.6.x and above, the AP certificate check is enabled by default on the vSZ/SZ-based controllers. Therefore, APs with expired certificates will not join the controller.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Root Cause:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Ruckus's original device certificates expired in November 2016. Any device manufactured before November 2016 has the old certificate.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How do I know this is an AP certificate issue?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A. On the AP side:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Log in to the AP CLI (SSH) and run the following command:
&lt;PRE&gt;&lt;CODE&gt;rkscli: get rpki-cert issuer
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;The AP with the following output will not join the controller as it has an old certificate:
&lt;PRE&gt;&lt;CODE&gt;Issuer: Ruckus Wireless, Inc.
OK
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If no alarms or events are generated on the controller and the AP is not listed in the SZ web GUI, we need to check the vSZ/SZ Snapshot log.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;B. On the SZ side:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;How to download the snapshot log:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Download the snapshot log from the controller GUI.&lt;/LI&gt;
&lt;LI&gt;Extract the log files.&lt;/LI&gt;
&lt;LI&gt;Navigate to &lt;CODE&gt;applogfiles&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;nginx&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;Access.logs&lt;/CODE&gt; and &lt;CODE&gt;error.log&lt;/CODE&gt;. (Steps shown in the screenshots below)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_0-1646212441942.png" style="width: 577px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2539i318245AA8C0DAD2A/image-dimensions/577x424?v=v2" width="577" height="424" role="button" title="sshekhar_0-1646212441942.png" alt="sshekhar_0-1646212441942.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_1-1646212441944.png" style="width: 581px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2538i3C73AF145A78D3F2/image-dimensions/581x258?v=v2" width="581" height="258" role="button" title="sshekhar_1-1646212441944.png" alt="sshekhar_1-1646212441944.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_2-1646212441945.png" style="width: 610px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2540i81554E6F1BEAFF6A/image-dimensions/610x93?v=v2" width="610" height="93" role="button" title="sshekhar_2-1646212441945.png" alt="sshekhar_2-1646212441945.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; In SZ/vSZ 6.0 and above, the file name is &lt;CODE&gt;ap.log&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Screenshot from vSZ 6.0 snapshot:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_3-1646212441951.png" style="width: 597px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2542i94FBD40089B13A02/image-dimensions/597x244?v=v2" width="597" height="244" role="button" title="sshekhar_3-1646212441951.png" alt="sshekhar_3-1646212441951.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_4-1646212441953.png" style="width: 602px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2541i10B3BA109D1C6492/image-dimensions/602x161?v=v2" width="602" height="161" role="button" title="sshekhar_4-1646212441953.png" alt="sshekhar_4-1646212441953.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;2. What to check in the log?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In the Access.log:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Search for the AP’s MAC address:
&lt;PRE&gt;&lt;CODE&gt;::ffff:192.168.1.59:443 - - [17/Dec/2021:13:01:50 +0000] "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1" 400 208 "-" "-" "-" "0.038"
::ffff:10.177.82.127:443 - - [14/Feb/2022:08:29:06 +0000] "PUT /wsg/ap/discovery/4C:B1:CD:18:E3:30 HTTP/1.1" 400 0 "-" "-" "-" "10.001"
&lt;/CODE&gt;&lt;/PRE&gt;
Error code 400 means "Bad request."&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;In the Error.log:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Look for entries like:
&lt;PRE&gt;&lt;CODE&gt;2021/12/17 13:01:50 [warn] 22321#22321: *2684 This is not a trusted certificate, connection will be rejected. while reading client request headers, client: ::ffff:192.168.1.59, server: localhost, request: "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1", host: "192.168.1.31:443"
2021/12/17 13:01:50 [warn] 22321#22321: *2684 client SSL certificate verify error: (10:certificate has expired) while reading client request headers, client: ::ffff:192.168.1.59, server: localhost, request: "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1", host: "192.168.1.31:443"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;II. How to solve it?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A. Allowing AP to join the controller:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt; Disable the AP-cert check on the controller to allow the AP to join, then enable it again and follow the procedure to update the AP certificate.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;To disable the AP cert check from the vSZ/SZ CLI (SSH):&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;ruckus&amp;gt;enable
password:
ruckus# config
ruckus(config)# no ap-cert-check
ruckus(config)# exit
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;To enable the AP cert check again:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;ruckus&amp;gt;enable
password:
ruckus# config
ruckus(config)# ap-cert-check
ruckus(config)# exit
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; If you disable the AP cert check to allow the AP to join, you need to upgrade the AP certificate as discussed in the given link: Ruckus Support.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;B. Update the certificate locally in the AP:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Access the AP GUI using either the default IP (192.168.0.1) or the DHCP-assigned IP in the web browser.&lt;/LI&gt;
&lt;LI&gt;Create a Certificate Request file:
&lt;UL&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Administration&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Management&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Certificate Verification&lt;/STRONG&gt; -&amp;gt; Click on &lt;STRONG&gt;Request&lt;/STRONG&gt; to release a new certificate. This will generate a .req file.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_5-1646212441957.png" style="width: 619px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2543iFFE99A6D56D2A7BD/image-dimensions/619x438?v=v2" width="619" height="438" role="button" title="sshekhar_5-1646212441957.png" alt="sshekhar_5-1646212441957.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Contact Ruckus Support to generate the .req file downloaded from the above step. (&lt;A href="https://support.ruckuswireless.com/contact-us" target="_blank"&gt;https://support.ruckuswireless.com/contact-us&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Once you receive the .res file, access the AP GUI, go to Maintenance, then Upgrade. Select Local Method for the Upgrade. In Target selection, choose Device Certificate, then select the .res file and upload the certificate.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_6-1646212441960.png" style="width: 683px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2544i23C80AE091200246/image-dimensions/683x371?v=v2" width="683" height="371" role="button" title="sshekhar_6-1646212441960.png" alt="sshekhar_6-1646212441960.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note: This usually reboots the AP. If it doesn’t, manually reboot the AP by going to Maintenance, then Reboot/Reset, and click Reboot Now.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2024 23:49:58 GMT</pubDate>
    <dc:creator>sarita_shekhar</dc:creator>
    <dc:date>2024-11-26T23:49:58Z</dc:date>
    <item>
      <title>New AP’s not joining the vSZ/SZ due to expired AP certificate</title>
      <link>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/New-AP-s-not-joining-the-vSZ-SZ-due-to-expired-AP-certificate/m-p/44240#M15</link>
      <description>&lt;P&gt;As a Sr. Technical Support Engineer, I have encountered this issue and would like to share my experience here:&lt;/P&gt;
&lt;P&gt;On the controller firmware version 3.6.x and above, the AP certificate check is enabled by default on the vSZ/SZ-based controllers. Therefore, APs with expired certificates will not join the controller.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Root Cause:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Ruckus's original device certificates expired in November 2016. Any device manufactured before November 2016 has the old certificate.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How do I know this is an AP certificate issue?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A. On the AP side:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Log in to the AP CLI (SSH) and run the following command:
&lt;PRE&gt;&lt;CODE&gt;rkscli: get rpki-cert issuer
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;The AP with the following output will not join the controller as it has an old certificate:
&lt;PRE&gt;&lt;CODE&gt;Issuer: Ruckus Wireless, Inc.
OK
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If no alarms or events are generated on the controller and the AP is not listed in the SZ web GUI, we need to check the vSZ/SZ Snapshot log.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;B. On the SZ side:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;How to download the snapshot log:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Download the snapshot log from the controller GUI.&lt;/LI&gt;
&lt;LI&gt;Extract the log files.&lt;/LI&gt;
&lt;LI&gt;Navigate to &lt;CODE&gt;applogfiles&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;nginx&lt;/CODE&gt; -&amp;gt; &lt;CODE&gt;Access.logs&lt;/CODE&gt; and &lt;CODE&gt;error.log&lt;/CODE&gt;. (Steps shown in the screenshots below)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_0-1646212441942.png" style="width: 577px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2539i318245AA8C0DAD2A/image-dimensions/577x424?v=v2" width="577" height="424" role="button" title="sshekhar_0-1646212441942.png" alt="sshekhar_0-1646212441942.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_1-1646212441944.png" style="width: 581px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2538i3C73AF145A78D3F2/image-dimensions/581x258?v=v2" width="581" height="258" role="button" title="sshekhar_1-1646212441944.png" alt="sshekhar_1-1646212441944.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_2-1646212441945.png" style="width: 610px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2540i81554E6F1BEAFF6A/image-dimensions/610x93?v=v2" width="610" height="93" role="button" title="sshekhar_2-1646212441945.png" alt="sshekhar_2-1646212441945.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; In SZ/vSZ 6.0 and above, the file name is &lt;CODE&gt;ap.log&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Screenshot from vSZ 6.0 snapshot:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_3-1646212441951.png" style="width: 597px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2542i94FBD40089B13A02/image-dimensions/597x244?v=v2" width="597" height="244" role="button" title="sshekhar_3-1646212441951.png" alt="sshekhar_3-1646212441951.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_4-1646212441953.png" style="width: 602px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2541i10B3BA109D1C6492/image-dimensions/602x161?v=v2" width="602" height="161" role="button" title="sshekhar_4-1646212441953.png" alt="sshekhar_4-1646212441953.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;2. What to check in the log?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In the Access.log:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Search for the AP’s MAC address:
&lt;PRE&gt;&lt;CODE&gt;::ffff:192.168.1.59:443 - - [17/Dec/2021:13:01:50 +0000] "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1" 400 208 "-" "-" "-" "0.038"
::ffff:10.177.82.127:443 - - [14/Feb/2022:08:29:06 +0000] "PUT /wsg/ap/discovery/4C:B1:CD:18:E3:30 HTTP/1.1" 400 0 "-" "-" "-" "10.001"
&lt;/CODE&gt;&lt;/PRE&gt;
Error code 400 means "Bad request."&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;In the Error.log:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Look for entries like:
&lt;PRE&gt;&lt;CODE&gt;2021/12/17 13:01:50 [warn] 22321#22321: *2684 This is not a trusted certificate, connection will be rejected. while reading client request headers, client: ::ffff:192.168.1.59, server: localhost, request: "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1", host: "192.168.1.31:443"
2021/12/17 13:01:50 [warn] 22321#22321: *2684 client SSL certificate verify error: (10:certificate has expired) while reading client request headers, client: ::ffff:192.168.1.59, server: localhost, request: "PUT /wsg/ap/discovery/D4:68:4D:2B:94:70 HTTP/1.1", host: "192.168.1.31:443"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;II. How to solve it?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A. Allowing AP to join the controller:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt; Disable the AP-cert check on the controller to allow the AP to join, then enable it again and follow the procedure to update the AP certificate.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;To disable the AP cert check from the vSZ/SZ CLI (SSH):&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;ruckus&amp;gt;enable
password:
ruckus# config
ruckus(config)# no ap-cert-check
ruckus(config)# exit
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;To enable the AP cert check again:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;ruckus&amp;gt;enable
password:
ruckus# config
ruckus(config)# ap-cert-check
ruckus(config)# exit
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;NOTE:&lt;/STRONG&gt; If you disable the AP cert check to allow the AP to join, you need to upgrade the AP certificate as discussed in the given link: Ruckus Support.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;B. Update the certificate locally in the AP:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Access the AP GUI using either the default IP (192.168.0.1) or the DHCP-assigned IP in the web browser.&lt;/LI&gt;
&lt;LI&gt;Create a Certificate Request file:
&lt;UL&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Administration&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Management&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Certificate Verification&lt;/STRONG&gt; -&amp;gt; Click on &lt;STRONG&gt;Request&lt;/STRONG&gt; to release a new certificate. This will generate a .req file.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_5-1646212441957.png" style="width: 619px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2543iFFE99A6D56D2A7BD/image-dimensions/619x438?v=v2" width="619" height="438" role="button" title="sshekhar_5-1646212441957.png" alt="sshekhar_5-1646212441957.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Contact Ruckus Support to generate the .req file downloaded from the above step. (&lt;A href="https://support.ruckuswireless.com/contact-us" target="_blank"&gt;https://support.ruckuswireless.com/contact-us&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;Once you receive the .res file, access the AP GUI, go to Maintenance, then Upgrade. Select Local Method for the Upgrade. In Target selection, choose Device Certificate, then select the .res file and upload the certificate.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sshekhar_6-1646212441960.png" style="width: 683px;"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/2544i23C80AE091200246/image-dimensions/683x371?v=v2" width="683" height="371" role="button" title="sshekhar_6-1646212441960.png" alt="sshekhar_6-1646212441960.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note: This usually reboots the AP. If it doesn’t, manually reboot the AP by going to Maintenance, then Reboot/Reset, and click Reboot Now.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 23:49:58 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/RUCKUS-Self-Help/New-AP-s-not-joining-the-vSZ-SZ-due-to-expired-AP-certificate/m-p/44240#M15</guid>
      <dc:creator>sarita_shekhar</dc:creator>
      <dc:date>2024-11-26T23:49:58Z</dc:date>
    </item>
  </channel>
</rss>

