cancel
Showing results for 
Search instead for 
Did you mean: 

Unable to install Unleashed R650 via mobile app and PC browser, SSH ok

filip_k
New Contributor II

Hi,

I bought second-hand Unleashed R650 and have trouble installing it. It's connected to my PoE router and it is normally getting IP from it's DHCP. PWR light is full green, CTL blinks green.

  • I did a factory reset (multiple times, actually)
  • The Configure.Me-XXX network is available.

However:

  • accessing the router's IP from PC always ends on page saying "Building the Unleashed Network. It may take a few minutes." Hours later, no change.
  • in Mobile app I connect to the Configure.Me but the Install fails with "Unable to fetch default configuration from the AP", see:ruckus_scr.jpg

 

 

 

 

Anyway I CAN easily connect through SSH/CLI using the DHCP-provided IP. Is there something I can do there?

I am fine working with ssh/cli though I'm not familiar with Ruckus itself so please bear with me... I was able to check firmware byut not switch to the Image1 yet to try that:

rkscli: fw show all
<Control Info>
ipaddr:
file: R650_200.14.6.1.179.bl7
size: 50503680
MD5 : 82C3CA2C98C5E1F22C5D5E6716741833
type: 0
local_file
-------------------------------------
current primary boot image is Image2
---------------<Image1 FW header>
Magic: RCKS
next_image: 0x380000
invalid: 0
hdr_len: 160
compression: l7
load_address: 0x42000000
entry_point: 0x42008000
timestamp: Wed Dec 18 01:19:46 2019
binl7_len: 24026976
hdr_version: 4
hdr_cksum: 0xC704
version: 114.0.0.0.1294 ( 114.0.0.0.1294 )
MD5: 3EB8C61483DD5581B458E9E1278EA2D6
product: r730 (0)
architecture: 0
chipset: 0
board_type: 0
board_class: 0
customer:
Image Sign Type: Fully Signed Image(FSI).
---------------<Image2 FW header>
Magic: RCKS
next_image: 0x380000
invalid: 0
hdr_len: 160
compression: l7
load_address: 0x42000000
entry_point: 0x42008000
timestamp: Sat Apr 8 15:36:28 2023
binl7_len: 50503520
hdr_version: 4
hdr_cksum: 0x9D8D
version: 200.14.6.1.179 ( 200.14.6.1.179 )
MD5: 82C3CA2C98C5E1F22C5D5E6716741833
product: r730 (0)
architecture: 0
chipset: 0
board_type: 0
board_class: 0
customer:
Image Sign Type: Fully Signed Image(FSI).
OK


I noticed similar issues though none are the same and didn't help much:

 

1 ACCEPTED SOLUTION

filip_k
New Contributor II

Ok, so that was it - after unplugging the old Ruckus setup the installation worked without a hitch.
It would be nice to have more informative error messages or a way to see it better in the logs, though.

View solution in original post

5 REPLIES 5

sanjay_kumar
RUCKUS Team Member

Hi @filip_k 

Could you please confirm if the below steps are performed:
1. Assign a static IP address from the CLI using the command 
ap-mode
set ipaddr wan <ipaddr> <netmask> <gateway>
example : set ipaddr wan 10.128.6.219 255.255.255.0 10.128.6.1

2. AP has the valid Gateway IP address configured and able to ping it from the AP CLI.

Above are the 2 scenarios where the AP can be stuck in "Building the Unleashed Network" state. Addressing these 2 step will resolve the issue.

 

Thanks for your reply.

However, still not fixed...

Re: 2. This is the automatic settings after reset and it seems correct:

rkscli: get ipaddr wan
IP Address: (dynamic, vlan 1), IP: 192.168.88.6 Netmask 255.255.255.0 Gateway 192.168.88.1

After change:

rkscli: get ipaddr wan
IP Address: (static, vlan 1), IP: 192.168.88.123 Netmask 255.255.255.0 Gateway 192.168.88.1

 Ping works:

rkscli: ping google.com
PING google.com (142.251.37.110): 56 data bytes
64 bytes from 142.251.37.110: seq=0 ttl=115 time=9.820 ms
64 bytes from 142.251.37.110: seq=1 ttl=115 time=10.019 ms
64 bytes from 142.251.37.110: seq=2 ttl=115 time=10.241 ms
64 bytes from 142.251.37.110: seq=3 ttl=115 time=9.602 ms
64 bytes from 142.251.37.110: seq=4 ttl=115 time=9.780 ms
--- google.com ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 9.602/9.892/10.241 ms

 FW update however does not, maybe due to the fw serve unavailable?:

rkscli: fw update
fw: Updating rcks_wlan.main ...
v54_fw_update: download fwupdate1.ruckuswireless.com section=rcks_fw.main image=Image1 ctl_file=r650_9991_cntrl.rcks (/writable/fw/main.cntl) local=0
NET_CLOSE() rc1=1
rks_fw_update.c:4691 v54_fw_update() Error: could not get control file
**fw(8571) : Control File Download Error
**(8571) wget: cannot connect to remote host (209.40.193.107): Connection timed out

rkscli: ping 209.40.193.107
PING 209.40.193.107 (209.40.193.107): 56 data bytes

--- 209.40.193.107 ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss
OK

 

naresh_kumar_74
Moderator
Moderator

Hello Filip, 

Thank you for your response.

Looking at the output provided, I see that the file is failing to download. Can you manually download the file using the below link and upgrade the access point. 

https://support.ruckuswireless.com/products/178-ruckus-r650#sort=relevancy&f:@source=[Software%20Dow...

You can use the below options.


Steps to upgrade Unleashed AP through ruckus FTP:

> Login into the Unleashed member AP CLI which is not upgrading
> Check reachability to an FTP server

rkscli
rkscli: fw set control <firmware image>
rkscli: fw set proto ftp
rkscli: fw set host <FTP SERVER IP>
rkscli: fw set user <FTP SERVER USERNAME>
rkscli: fw set password <FTP SERVER PASSWORD>
rkscli: fw up

Steps to upgrade Unleashed AP through ruckus TFTP:

> Login into the Unleashed member AP CLI which is not upgrading
> Check reachability to an TFTP server
> If you are unable to reach TFTP server from AP or upgrade is failing, disable the firewall on server where TFTP server is hosted.

rkscli: fw set proto tftp
rkscli: fw set host <FTP SERVER IP>
rkscli: fw set control <Target Firmware file in TFTP server root folder>
rkscli: fw upgrade

Regards,

Naresh Kumar 

Thanks, I was able to upgrade the firmware now. I hoped it would solve the original issue of the AP being stuck on "Building the Unleashed Network. It may take a few minutes."

However, it did not help, it's still stuck.

Could there be an issue that I already have another Ruckus APs in my network which are already set up? 
I looked at syslog but couldn't figure anything, can you please check:

Jul 27 08:31:40 RuckusAP user.notice root: ocsp_staple.c:327 ---
Jul 27 08:31:40 RuckusAP user.notice root: SSL handshake has read 9249 bytes and written 366 bytes
Jul 27 08:31:40 RuckusAP user.notice root: ocsp_staple.c:757 cert status: (1)
Jul 27 08:31:40 RuckusAP daemon.info hub_registrar: rsm_hub.c:208 ocsp_staple 'GOOD' on ap-registrar.ruckuswireless.com
Jul 27 08:31:40 RuckusAP daemon.info hub_registrar: hub.c:283 (ocsp-stapling): host: ap-registrar.ruckuswireless.com
Jul 27 08:31:40 RuckusAP daemon.info hub_registrar: hub.c:293 (ocsp-stapling): 'Good' - querying registrar @ ap-registrar.ruckuswireless.com
Jul 27 08:31:40 RuckusAP daemon.info hub_registrar: rsm_hub.c:400 Querying controllerIP using curl --cacert /etc/rkscacerts.pem -m 20 https://ap-registrar.ruckuswireless.com/api/v2/accesspoints/272039000522 > /tmp/hub_controller_v2_addr 2>/dev/null
Jul 27 08:31:41 RuckusAP user.notice hub_registrar: query result - ''
Jul 27 08:31:41 RuckusAP daemon.info hub_registrar: rsm_hub.c:378 Serial: null
Jul 27 08:31:41 RuckusAP daemon.info hub_registrar: rsm_hub.c:379 AP Type: null
Jul 27 08:31:41 RuckusAP daemon.info hub_registrar: rsm_hub.c:380 IPSEC GW1: null
Jul 27 08:31:41 RuckusAP daemon.info hub_registrar: rsm_hub.c:381 Controller: null
Jul 27 08:31:41 RuckusAP daemon.info hub_registrar: rsm_hub.c:382 Controller2: null
Jul 27 08:31:49 RuckusAP local2.err syslog: lwapp_wtp_getaddrinfo failed to resolve unleashed
Jul 27 08:31:55 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.88.255
Jul 27 08:31:56 RuckusAP daemon.info hub_registrar: hub.c:271 DNS resolved successfully for ap-registrar.ruckuswireless.com(34.170.110.156)
Jul 27 08:31:56 RuckusAP daemon.info hub_registrar: hub.c:275 Sending web based PING request to APR (ap-registrar.ruckuswireless.com)
Jul 27 08:31:56 RuckusAP daemon.info hub_registrar: hub.c:199 APR (ap-registrar.ruckuswireless.com) reached successfully
Jul 27 08:31:56 RuckusAP daemon.info hub_registrar: rsm_hub.c:197 OCSP: staple cmd: (ocsp_staple -r /etc/rkscacerts.pem -s/tmp/ss -t/tmp/ca -u/tmp/ocsp-check -S https://ap-registrar.ruckuswireless.com 1>/dev/null 2>&1)
Jul 27 08:31:57 RuckusAP user.notice root: ocsp_staple.c:552 host = ap-registrar.ruckuswireless.com
Jul 27 08:31:57 RuckusAP user.notice root: ocsp_staple.c:553 port = 443
Jul 27 08:31:57 RuckusAP user.notice root: ---
Jul 27 08:31:57 RuckusAP user.notice root: Certificate chain
Jul 27 08:31:57 RuckusAP user.notice root: 0 s:/C=US/ST=North Carolina/L=Hickory/O=CommScope, Inc./CN=*.ruckuswireless.com
Jul 27 08:31:57 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:31:57 RuckusAP user.notice root: 1 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:31:57 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:31:57 RuckusAP user.notice root: 2 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:31:57 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority
Jul 27 08:31:57 RuckusAP user.notice root: ---
Jul 27 08:31:57 RuckusAP user.notice root: Server certificate
Jul 27 08:31:57 RuckusAP user.notice root: subject=/C=US/ST=North Carolina/L=Hickory/O=CommScope, Inc./CN=*.ruckuswireless.com
Jul 27 08:31:57 RuckusAP user.notice root: issuer=/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:31:57 RuckusAP user.notice root: ---
Jul 27 08:31:57 RuckusAP user.notice root: Acceptable client certificate CA names
Jul 27 08:31:57 RuckusAP user.notice root: /OU=Domain Control Validated/CN=apr-client.rkus.club
Jul 27 08:31:57 RuckusAP user.notice root: /CN=RuckusPKI-Root/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/ST=CA/O=Ruckus Wireless/OU=Kumo Project/CN=Kumo Prod Intermediate CA
Jul 27 08:31:57 RuckusAP user.notice root: /CN=RuckusPKI-DeviceCA/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:31:57 RuckusAP user.notice root: /CN=RuckusPKI-DeviceSubCA-1/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:31:57 RuckusAP user.notice root: /CN=RuckusPKI-DeviceSubCA-2/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/ST=CA/L=Sunnyvale/O=Ruckus Wireless/OU=Kumo Project/CN=Kumo Prod Root CA
Jul 27 08:31:57 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority
Jul 27 08:31:57 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA
Jul 27 08:31:57 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Organization Validation Secure Server CA
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certs.godaddy.com/repository//CN=Go Daddy Secure Certificate Authority - G2
Jul 27 08:31:57 RuckusAP user.notice root: /O=Entrust.net/OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Certification Authority (2048)
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/ST=California/L=Sunnyvale/O=Ruckus IT Cloud DevOps/OU=ITCloudDevOps/CN=apregistercloudsupport.ruckuswireless.com/emailAddress=dev-ops@ruckuswireless.com
Jul 27 08:31:57 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - EC1
Jul 27 08:31:57 RuckusAP user.notice root: ocsp_staple.c:327 ---
Jul 27 08:31:57 RuckusAP user.notice root: SSL handshake has read 9249 bytes and written 366 bytes
Jul 27 08:31:57 RuckusAP user.notice root: ocsp_staple.c:757 cert status: (1)
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:208 ocsp_staple 'GOOD' on ap-registrar.ruckuswireless.com
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: hub.c:283 (ocsp-stapling): host: ap-registrar.ruckuswireless.com
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: hub.c:293 (ocsp-stapling): 'Good' - querying registrar @ ap-registrar.ruckuswireless.com
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:400 Querying controllerIP using curl --cacert /etc/rkscacerts.pem -m 20 https://ap-registrar.ruckuswireless.com/api/v2/accesspoints/272039000522 > /tmp/hub_controller_v2_addr 2>/dev/null
Jul 27 08:31:57 RuckusAP user.notice hub_registrar: query result - ''
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:378 Serial: null
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:379 AP Type: null
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:380 IPSEC GW1: null
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:381 Controller: null
Jul 27 08:31:57 RuckusAP daemon.info hub_registrar: rsm_hub.c:382 Controller2: null
Jul 27 08:31:58 RuckusAP daemon.notice meshd[843]: Err 22 Failed to start scan
Jul 27 08:32:11 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.88.255
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: hub.c:271 DNS resolved successfully for ap-registrar.ruckuswireless.com(34.170.110.156)
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: hub.c:275 Sending web based PING request to APR (ap-registrar.ruckuswireless.com)
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: hub.c:199 APR (ap-registrar.ruckuswireless.com) reached successfully
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: rsm_hub.c:197 OCSP: staple cmd: (ocsp_staple -r /etc/rkscacerts.pem -s/tmp/ss -t/tmp/ca -u/tmp/ocsp-check -S https://ap-registrar.ruckuswireless.com 1>/dev/null 2>&1)
Jul 27 08:32:13 RuckusAP user.notice root: ocsp_staple.c:552 host = ap-registrar.ruckuswireless.com
Jul 27 08:32:13 RuckusAP user.notice root: ocsp_staple.c:553 port = 443
Jul 27 08:32:13 RuckusAP user.notice root: ---
Jul 27 08:32:13 RuckusAP user.notice root: Certificate chain
Jul 27 08:32:13 RuckusAP user.notice root: 0 s:/C=US/ST=North Carolina/L=Hickory/O=CommScope, Inc./CN=*.ruckuswireless.com
Jul 27 08:32:13 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:32:13 RuckusAP user.notice root: 1 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:32:13 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:32:13 RuckusAP user.notice root: 2 s:/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:32:13 RuckusAP user.notice root: i:/C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority
Jul 27 08:32:13 RuckusAP user.notice root: ---
Jul 27 08:32:13 RuckusAP user.notice root: Server certificate
Jul 27 08:32:13 RuckusAP user.notice root: subject=/C=US/ST=North Carolina/L=Hickory/O=CommScope, Inc./CN=*.ruckuswireless.com
Jul 27 08:32:13 RuckusAP user.notice root: issuer=/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:32:13 RuckusAP user.notice root: ---
Jul 27 08:32:13 RuckusAP user.notice root: Acceptable client certificate CA names
Jul 27 08:32:13 RuckusAP user.notice root: /OU=Domain Control Validated/CN=apr-client.rkus.club
Jul 27 08:32:13 RuckusAP user.notice root: /CN=RuckusPKI-Root/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/ST=CA/O=Ruckus Wireless/OU=Kumo Project/CN=Kumo Prod Intermediate CA
Jul 27 08:32:13 RuckusAP user.notice root: /CN=RuckusPKI-DeviceCA/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:32:13 RuckusAP user.notice root: /CN=RuckusPKI-DeviceSubCA-1/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:32:13 RuckusAP user.notice root: /CN=RuckusPKI-DeviceSubCA-2/O=Ruckus Wireless Inc./L=Sunnyvale/ST=California/C=US
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/ST=CA/L=Sunnyvale/O=Ruckus Wireless/OU=Kumo Project/CN=Kumo Prod Root CA
Jul 27 08:32:13 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority
Jul 27 08:32:13 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA
Jul 27 08:32:13 RuckusAP user.notice root: /C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Organization Validation Secure Server CA
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certs.godaddy.com/repository//CN=Go Daddy Secure Certificate Authority - G2
Jul 27 08:32:13 RuckusAP user.notice root: /O=Entrust.net/OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Certification Authority (2048)
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Certification Authority - L1K
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/ST=California/L=Sunnyvale/O=Ruckus IT Cloud DevOps/OU=ITCloudDevOps/CN=apregistercloudsupport.ruckuswireless.com/emailAddress=dev-ops@ruckuswireless.com
Jul 27 08:32:13 RuckusAP user.notice root: /C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - EC1
Jul 27 08:32:13 RuckusAP user.notice root: ocsp_staple.c:327 ---
Jul 27 08:32:13 RuckusAP user.notice root: SSL handshake has read 9249 bytes and written 366 bytes
Jul 27 08:32:13 RuckusAP user.notice root: ocsp_staple.c:757 cert status: (1)
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: rsm_hub.c:208 ocsp_staple 'GOOD' on ap-registrar.ruckuswireless.com
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: hub.c:283 (ocsp-stapling): host: ap-registrar.ruckuswireless.com
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: hub.c:293 (ocsp-stapling): 'Good' - querying registrar @ ap-registrar.ruckuswireless.com
Jul 27 08:32:13 RuckusAP daemon.info hub_registrar: rsm_hub.c:400 Querying controllerIP using curl --cacert /etc/rkscacerts.pem -m 20 https://ap-registrar.ruckuswireless.com/api/v2/accesspoints/272039000522 > /tmp/hub_controller_v2_addr 2>/dev/null