cancel
Showing results for 
Search instead for 
Did you mean: 

AP R510 can't connect to ICX7150 "ICX Switch is Connecting"

ohabib
New Contributor

I have one ICX7150 and two R510 AP .

ICX7150 - FW Version:09.0.10dT211 (SPS09010d.bin)

R510 - FW version:  200.13.6.1.319

R510 can't connect to the ICX switch and shows "ICX Switch is Connecting". It used to work with the old FW release, what is going on ? SSH is enabled, I can manually SSH to the Switch or AP 

I saw a lot of other questions about the same topic but nothing there helped 

11 REPLIES 11

Hi Vásquez_Fer

No luck. After creating an RSA key along with the original ec384 key .. ssh is showing the following 

client_input_hostkeys: received duplicated ssh-rsa host key

Anyway, here is the show logging saying that the SSH access is rejected 

SSH@ICX7150-C12-SWITCH(config)#show logging
Syslog logging: enabled ( 0 messages dropped, 0 flushes, 0 overruns)
Buffer logging: level ACDMEINW, 150 messages logged
level code: A=alert C=critical D=debugging M=emergency E=error
I=informational N=notification W=warning

Static Log Buffer:
Oct 06 19:00:15:I:System: Stack unit 1 POE PS 1, Internal Power supply with 124000 mwatts capacity is up

Dynamic Log Buffer (4000 lines):
Oct 06 12:37:22:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:36:53:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:36:25:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:35:56:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:35:28:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:34:59:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:34:03:I:Security: Web login by super from src IP 192.168.1.48
Oct 06 12:34:03:I:Security: Web login by super from src IP 192.168.1.48
Oct 06 12:33:59:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:33:41:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:33:22:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:33:08:I:Security: ssh login by super from src IP 192.168.1.48 from src MAC a483.e7c4.9475 to PRIVILEGED EXEC mode
Oct 06 12:33:04:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:32:50:I:Security: ssh login by super from src IP 192.168.1.48 from src MAC a483.e7c4.9475 to USER EXEC mode
Oct 06 12:32:45:N:sshd: SSH access by user super from src 192.168.1.3 rejected, 0 attempt(s)
Oct 06 12:32:43:I:sshd: Failed publickey for super from 192.168.1.48 port 51190 ssh2
--More--, next page: Space, next line: Return key, quit: Control-c

 

Hi @ohabib 

Hope you are doing well ! 

Checking the RUCKUS data it appears that there is an ongoing issue from the unleashed side  with this issue that should be fixed in future versions.

issue.PNG

What I recommend is to be on the recommended version on Switch based on the support portal. 

recommended.PNG

Best Regards 

Fernando Vasquez