cancel
Showing results for 
Search instead for 
Did you mean: 

Re-adding a deleted AP

roy_mcmorran
New Contributor II

Hi All,

ZoneDirector 1200 here, running 10.5.0, with about 40 APs.  I deleted an AP from the Access Points list, but now I would like to re-add it back.  But it won't appear on the list for me to "approve".  Is there something I need to do to tell the ZD to see/allow it? 

The AP does show up with an IP address in the management subnet, and I can SSH to it.  I have tried factory resetting the AP as well as "set director ip x.x.x.x" from the CLI but I still don't see it on the ZD AP list.  Am I missing something?

Thanks for any assistance!

1 ACCEPTED SOLUTION

UPDATE:

I noticed this in the logs:

May 24 17:37:23 RuckusAP daemon.err cubic[759]: wrap_getaddrinfo:1034 Address 
[RuckusController.asdf.net] is invalid address.[-2: Name or service not known].

(where asdf.net is our domain)

So I added this A record to our DNS, pointing to the Zone Director address, and voila, the AP shows up!  I was able to approve it and add it.

It's weird because this record never existed in DNS in the past and the other 42 APs joined fine.

Just goes to show - it is always DNS!

Thanks Vineet for pointing me to the AP logs.

View solution in original post

6 REPLIES 6

Vineet_nejwala
Moderator
Moderator

Hi @roy_mcmorran 

Can you share output of below command from the problematic AP :

get director

get syslog log

Also is there any firewall in between or this is a flat network ?

Best Regards

Vineet

roy_mcmorran
New Contributor II

Hi Vineet, thank you. 

Both ZD and all APs are in the same subnet and VLAN.  No firewall.

Here's the output:

rkscli: get director
------ ZoneDirector Info ------
Primary Controller : 192.168.0.10
Secondary Controller : n/a
DHCP Opt43 Code : 3
AP is in Stand-alone mode.
OK

(that is the correct IP for the ZD)

And the syslog (scroll way down!):

rkscli: get syslog log
May 20 15:08:08 RuckusAP daemon.info hub_registrar: OCSP: APR lookup timer expired
May 20 15:08:09 RuckusAP daemon.notice rsmd[93]: lldpd ........... [started] (0.301)
May 20 15:08:20 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:08:38 RuckusAP local2.err syslog: Parameter value L2 is invalid for parameter Tunnel-Mode
May 20 15:08:40 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:08:55 RuckusAP authpriv.info dropbear[1626]: Child connection from 192.168.0.160:1902
May 20 15:08:58 RuckusAP authpriv.notice dropbear[1626]: Deferring to RKS shell to authenticate password.
May 20 15:08:58 RuckusAP authpriv.err dropbear[1626]: chown(/dev/ttyp0, 0, 5) failed: Read-only file system
May 20 15:08:58 RuckusAP authpriv.err dropbear[1626]: chmod(/dev/ttyp0, 0620) failed: Read-only file system
May 20 15:09:00 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:09:06 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:09:07 RuckusAP user.crit syslog: @@99018, sshInitiation, "apMac"="80:03:84:10:1D:40", "reason"="SSH Login successful with IP 192.168.0.160 username super"
May 20 15:09:20 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:09:40 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:10:00 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:10:19 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:10:20 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:10:40 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:11:00 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:11:20 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:11:34 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:11:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:12:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:12:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:12:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:12:44 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:13:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:13:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:13:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:13:55 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:14:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:14:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:14:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:15:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:15:19 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:15:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:15:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:16:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:16:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:16:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:16:42 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:17:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:17:21 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:17:41 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:17:53 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:18:01 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:18:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:18:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:19:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:19:08 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:19:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:19:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:20:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:20:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:20:25 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:20:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:21:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:21:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:21:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:21:47 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:22:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:22:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:22:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:23:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:23:11 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:23:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:23:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:24:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:24:22 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:24:28 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:24:42 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:24:45 RuckusAP user.info syslog: bba: sta-2g=0 sta-5g=0 perc=25 sta-2g-expect=0
May 20 15:24:45 RuckusAP user.info syslog: bba: Good client distribution
May 20 15:25:02 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:25:22 RuckusAP user.crit syslog: @@99015, apRemoteSessionTimeout, "apMac"="80:03:84:10:1D:40", "reason"="Remote interactive session of AP terminated due to login/session timeout"
May 20 15:25:22 RuckusAP authpriv.info dropbear[1626]: Exit (rkscli): Idle timeout
May 20 15:25:22 RuckusAP authpriv.err dropbear[1626]: chown /dev/ttyp0 0 0 failed: Read-only file system
May 20 15:25:22 RuckusAP authpriv.err dropbear[1626]: chmod /dev/ttyp0 0666 failed: Read-only file system
May 20 15:25:23 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:25:38 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 20 15:25:39 RuckusAP authpriv.info dropbear[10786]: Child connection from 192.168.0.160:1144
May 20 15:25:43 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 7168
May 20 15:25:44 RuckusAP authpriv.notice dropbear[10786]: Deferring to RKS shell to authenticate password.
May 20 15:25:44 RuckusAP authpriv.err dropbear[10786]: chown(/dev/ttyp0, 0, 5) failed: Read-only file system
May 20 15:25:44 RuckusAP authpriv.err dropbear[10786]: chmod(/dev/ttyp0, 0620) failed: Read-only file system
May 20 15:25:50 RuckusAP user.crit syslog: @@99018, sshInitiation, "apMac"="80:03:84:10:1D:40", "reason"="SSH Login successful with IP 192.168.0.160 username super"
OK
rkscli:

 

The output doesn't give relevant information on AP/ZD connectivity. Can you share me the AP version by command "get version" and next plan would be to again set the director IP manually and at same moment do a "get syslog log".

Best Regards

vineet

Hi Vineet,

I have tried several different firmwares now, do you have a suggestion which would be best to use?

Here's another attempt after another hardware reset, and then set director ip again.  The entire log is too big to paste here, I had to delete some text.

Please login: super
password :
Copyright(C) 2018 Ruckus Wireless, Inc. All Rights Reserved.

** Ruckus R320 Multimedia Hotzone Wireless AP: 432009007277

rkscli: get director
------ ZoneDirector Info ------
Primary Controller : n/a
Secondary Controller : n/a
DHCP Opt43 Code : 3
AP is in Stand-alone mode.
OK
rkscli: get version
Ruckus R320 Multimedia Hotzone Wireless AP
Version: 112.0.0.0.920
OK

rkscli: set director ip 192.168.0.10
** Please reboot for this change to take effect
OK
rkscli: reboot
OK

login as: super
Access granted. Press Return to begin session.

Please login: super
password :
Copyright(C) 2018 Ruckus Wireless, Inc. All Rights Reserved.

** Ruckus R320 Multimedia Hotzone Wireless AP: 432009007277

rkscli: get director
------ ZoneDirector Info ------
Primary Controller : 192.168.0.10
Secondary Controller : n/a
DHCP Opt43 Code : 3
AP is in Stand-alone mode.
OK
rkscli: get syslog log
May 24 15:09:21 RuckusAP syslog.info syslogd started: BusyBox v1.15.2
May 24 15:09:21 RuckusAP syslog.info syslog: Last Reboot Reason: user reboot
May 24 15:09:21 RuckusAP kern.notice kernel: klogd started: BusyBox v1.15.2 (2019-02-12 03:54:05 PST)
...

[deleted]

...
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: mosquitto ....... [started] (0.074)
May 24 15:09:22 RuckusAP daemon.err dhcp6c[538]: dhcp6_ctl_authinit: failed to open /tmp/dhcp6cctlkey: No such file or directory
May 24 15:09:22 RuckusAP daemon.info mosquitto[553]: mosquitto version 1.4.2 (build date 2019-02-12 03:49:37-0800) starting
May 24 15:09:22 RuckusAP daemon.info mosquitto[553]: Config loaded from /tmp/mosquitto.conf.
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: matrix .......... [started] (0.034)
May 24 15:09:22 RuckusAP daemon.info mosquitto[553]: Opening ipv6 listen socket on port 1883.
May 24 15:09:22 RuckusAP daemon.info mosquitto[553]: Opening ipv4 listen socket on port 1883.
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.573883] SmartDevice: Version 2.1.0
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.573883] Copyright (c) 2005-2009 Ruckus Wireless, All Rights Reserved
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.573921] v54_SM_devinit: igmp_count=64, mld_count=64, mcast_mbrs=256
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.574047] v54_glue 2.2 Copyright (C) 2006-2009 Ruckus Wireless. gblQOS(0x284c)=d9a14000 Mcast(64/64/256) numIFs(0xf44)=96 FiltTbl(0x608)=16
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.574072] wireless igmp(d988d000/d9a18000/d988c800/d9a20000) wireless mld(d9853000/d9a1c000/d9854000/d9a24000) wired igmp(d988c000/d9a28000/d988b800/d9a30000) wired mld(d9855000/d9a2c000/d9856000/d9a34000)
May 24 15:09:22 RuckusAP kern.info kernel: [ 36.574193] kstat_init_tasklets: hash=0x2c, func=0xbf555094 v54_flow_cur_ager
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.685737] mcast_conf_ioctl_set: The enable value is 0
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.685828] known_mcast_conf_ioctl_set: The known multicast traffic ratelimit value is 40
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.685891] unknown_mcast_conf_ioctl_set: The unknown multicast traffic ratelimit value is 30
May 24 15:09:22 RuckusAP kern.warn kernel: [ 36.685951] mcast_mask_conf_ioctl_set: The mask value is 0
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: smartcast ....... [started] (0.217)
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: gpsd ............ [started] (0.018)
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: cm .............. [started] (0.018)
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: IP event ........ [started] (0.018)
May 24 15:09:22 RuckusAP authpriv.warn dropbear[595]: Failed loading /writable/data/dropbear//dropbear_rsa_host_key
May 24 15:09:22 RuckusAP authpriv.warn dropbear[595]: Failed loading /writable/data/dropbear//dropbear_dss_host_key
May 24 15:09:22 RuckusAP authpriv.warn dropbear[595]: Failed loading /writable/data/dropbear//dropbear_ecdsa_host_key
May 24 15:09:22 RuckusAP authpriv.info dropbear[596]: Running in background
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: sshd ............ [started] (0.040)
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: dbclient ........ [started] (0.020)
May 24 15:09:22 RuckusAP daemon.notice rsmd[94]: supplicant ...... [started] (0.023)
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: hostap .......... [started] (0.027)
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: eth1x ........... [started] (0.020)
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: hub_registrar ... [started] (0.109)
May 24 15:09:23 RuckusAP daemon.notice mosquitto[553]: New connection from local, fd is 8
May 24 15:09:23 RuckusAP daemon.notice mosquitto[553]: New client connected from local as LclCtrl (c1, k0).
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: webserver ....... [started] (0.540)
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: led ............. [started] (0.021)
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: rfwd ............ [started] (0.000)
May 24 15:09:23 RuckusAP kern.info kernel: [ 37.557061] v54_bsp: 0xffff
May 24 15:09:23 RuckusAP daemon.notice rsmd[94]: telnetd ......... [started] (0.020)
May 24 15:09:24 RuckusAP daemon.notice rsmd[94]: lldpd ........... [started] (0.274)
May 24 15:09:24 RuckusAP daemon.info hub_registrar: OCSP: started APR lookup timer
May 24 15:09:24 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 1536
May 24 15:09:24 RuckusAP local0.err snmpd[693]: duplicate registration: MIB modules mibII/interfaces and if number (oid .1.3.6.1.2.1.2.1).
May 24 15:09:24 RuckusAP daemon.notice rsmd[94]: snmpd ........... [started] (0.943)
May 24 15:09:24 RuckusAP local0.info snmpd[709]: NET-SNMP version 5.7.3
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: snmptrap ........ [started] (0.090)
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: apmgr ........... [started] (0.028)
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: meshd ........... [started] (0.023)
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: wrad ............ [started] (0.028)
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: sntp ............ [started] (0.018)
May 24 15:09:25 RuckusAP daemon.notice rsmd[94]: hotspot ......... [started] (0.020)
May 24 15:09:25 RuckusAP daemon.notice wrad[726]: wrad init
May 24 15:09:25 RuckusAP daemon.notice wrad[726]: wrad_state_exit:
May 24 15:09:25 RuckusAP daemon.notice wrad[726]: wrad_state_enter:
May 24 15:09:25 RuckusAP daemon.notice wrad[726]: wrad_state_exit: I
May 24 15:09:25 RuckusAP daemon.notice wrad[726]: wrad_state_enter: I -> -, forbid_wl_hopping=0
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.380485] Hello world, dot1x!
May 24 15:09:25 RuckusAP user.info syslog: IEEE 802.11: hostapd_ctrl_interface_init success
May 24 15:09:25 RuckusAP user.info syslog: IEEE 802.11: main pidFile: /var/run/hostapd.pid, pidVal: 734
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.570376] ess_edma c080000.edma: eth0: GMAC Link is up with phy_speed=1000
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.570423] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.570865] br0: port 1(eth0) entered forwarding state (kworker/0:1,46)
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.570964] br0: port 1(eth0) entered forwarding state (kworker/0:1,46)
May 24 15:09:25 RuckusAP kern.info kernel: [ 39.572055] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
May 24 15:09:26 RuckusAP kern.info kernel: [ 40.573264] br0: port 1(eth0) entered forwarding state (swapper/0,0)
May 24 15:09:27 RuckusAP daemon.info hostapd: wlan102: IEEE 802.11 hostapd_setup_interface:1614:1653404967,Using interface wlan102 with hwaddr 80:03:84:d0:1d:43 and ssid 'Recover.Me-101D40'
May 24 15:09:27 RuckusAP daemon.info hostapd: wlan102: IEEE 802.11 Customize Called Station ID Attribute
May 24 15:09:27 RuckusAP daemon.info hostapd: wlan102: RADIUS accounting_report_state:1208:1653404967, ifname:wlan102, ssid:Recover.Me-101D40, state:ON, identifier:0
May 24 15:09:27 RuckusAP kern.warn kernel: [ 41.632704] ol_ath_cwm_init: mode 0 extoffset 0 protmode 0 protspacing 0 cw_enable 0
May 24 15:09:27 RuckusAP kern.warn kernel: [ 41.632704]
May 24 15:09:27 RuckusAP kern.warn kernel: [ 41.632830] wmi_unified_pdev_tpc_config_event_handler 12880 scn->txpower_scale 0 scn->max_tx_power 1 ic->ic_txpowlimit 63
May 24 15:09:27 RuckusAP kern.info kernel: [ 41.636144] br14: port 1(wlan102) entered forwarding state (hostapd,734)
May 24 15:09:27 RuckusAP kern.info kernel: [ 41.636221] br14: port 1(wlan102) entered forwarding state (hostapd,734)
May 24 15:09:27 RuckusAP daemon.info hostapd: wlan103: IEEE 802.11 hostapd_setup_interface:1614:1653404967,Using interface wlan103 with hwaddr 80:03:84:50:1d:47 and ssid 'Recover.Me-101D40'
May 24 15:09:28 RuckusAP daemon.info hostapd: wlan103: IEEE 802.11 Customize Called Station ID Attribute
May 24 15:09:28 RuckusAP daemon.info hostapd: wlan103: RADIUS accounting_report_state:1208:1653404968, ifname:wlan103, ssid:Recover.Me-101D40, state:ON, identifier:0
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.887028] ol_ath_cwm_init: mode 4 extoffset 1 protmode 0 protspacing 0 cw_enable 0
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.887028]
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.887153] wmi_unified_pdev_tpc_config_event_handler 12880 scn->txpower_scale 0 scn->max_tx_power 1 ic->ic_txpowlimit 63
May 24 15:09:28 RuckusAP kern.info kernel: [ 41.890626] br14: port 2(wlan103) entered forwarding state (hostapd,734)
May 24 15:09:28 RuckusAP kern.info kernel: [ 41.890697] br14: port 2(wlan103) entered forwarding state (hostapd,734)
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: tr069 ........... [started] (2.887)
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.901438] ol_ath_cwm_init: mode 0 extoffset 0 protmode 0 protspacing 1 cw_enable 0
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.901438] ******** ieee80211_cancel_scan,856: cancel scan
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.901611] [2022/5/24 15:9:28] wmi_unified_vdev_stop_send for vap 15
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: scgdiscovery .... [started] (0.027)
May 24 15:09:28 RuckusAP kern.warn kernel: [ 41.928819] [2022/5/24 15:9:28] wmi_unified_vdev_down_send for vap 15
May 24 15:09:28 RuckusAP kern.info kernel: [ 41.948177] br14: port 1(wlan102) entered disabled state (wrad,726)
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: cubic ........... [started] (0.066)
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: ztmd ............ [started] (0.023)
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: sysinfo-archive . [started] (0.102)
May 24 15:09:28 RuckusAP kern.warn kernel: [ 42.096913] ol_ath_cwm_init: mode 4 extoffset -1 protmode 0 protspacing 0 cw_enable 0
May 24 15:09:28 RuckusAP kern.warn kernel: [ 42.096913] ******** ieee80211_cancel_scan,856: cancel scan
May 24 15:09:28 RuckusAP kern.warn kernel: [ 42.097063] [2022/5/24 15:9:28] wmi_unified_vdev_stop_send for vap 13
May 24 15:09:28 RuckusAP kern.warn kernel: [ 42.124211] [2022/5/24 15:9:28] wmi_unified_vdev_down_send for vap 13
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: l2tp ............ [started] (0.022)
May 24 15:09:28 RuckusAP daemon.notice rsmd[94]: zapd ............ [started] (0.000)
May 24 15:09:28 RuckusAP kern.info kernel: [ 42.143954] br14: port 2(wlan103) entered disabled state (wrad,726)
May 24 15:09:28 RuckusAP daemon.notice wrad[726]: main loop
May 24 15:09:28 RuckusAP daemon.info channel-wifi0: channelfly mode set to ENABLED
May 24 15:09:28 RuckusAP daemon.info channel-wifi0: Starting channelfly
May 24 15:09:28 RuckusAP kern.debug kernel: [ 42.383989] v54cf: v54cf_open: inode=dedbc738, filp=de162240
May 24 15:09:28 RuckusAP daemon.err cubic[759]: apcfg_general_get_wan_ipv6:837 Get IP error. stop rsm config get/set, please check the config key and value
May 24 15:09:28 RuckusAP daemon.err cubic[759]: wrap_getaddrinfo:1034 Address [RuckusController] is invalid address.[-2: Name or service not known].
May 24 15:09:28 RuckusAP daemon.err cubic[759]: resolve_addrinfo:1069 wrap_getaddrinfo with addr [RuckusController] returns fail.
May 24 15:09:28 RuckusAP daemon.err cubic[759]: curl_https_request:1136 resolve address[RuckusController] fail.
May 24 15:09:28 RuckusAP daemon.info channel-wifi1: channelfly mode set to ENABLED
May 24 15:09:28 RuckusAP daemon.info channel-wifi1: Starting channelfly
May 24 15:09:28 RuckusAP kern.debug kernel: [ 42.726730] v54cf: v54cf_open: inode=ded7e3b8, filp=d9867300
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: channelfly ...... [started] (1.045)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: mshngrd ......... [started] (0.022)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: rfmd ............ [started] (0.018)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: wipingd ......... [started] (0.023)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: dnsspoof ........ [started] (0.017)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: rflow_radiod .... [started] (0.026)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: dbdc ............ [started] (0.026)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: PoEMgr .......... [started] (0.017)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: bbada ........... [started] (0.020)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: linkd ........... [started] (0.019)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: rsmd: started 53/55 modules -
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: (0.000)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: rflow_radiod .... [stopped] (0.075)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: rflow_radiod .... [started] (0.026)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: dbclient ........ [stopped] (0.020)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: dbclient ........ [started] (0.020)
May 24 15:09:29 RuckusAP daemon.notice rsmd[94]: lldpd ........... [stopped] (0.021)
May 24 15:09:31 RuckusAP daemon.info init: starting pid 877, tty '/dev/ttyMSM0': '/usr/bin/-rkscli'
May 24 15:09:32 RuckusAP daemon.notice rsmd[94]: lldpd ........... [started] (0.434)
May 24 15:09:33 RuckusAP daemon.err cubic[759]: apcfg_general_get_wan_ipv6:837 Get IP error. stop rsm config get/set, please check the config key and value
May 24 15:09:40 RuckusAP cron.notice ntpclient[989]: Using server: 192.168.0.4
May 24 17:36:29 RuckusAP cron.notice ntpclient[989]: Time set from remote server
May 24 17:36:29 RuckusAP cron.notice ntpclient[989]: Skew 8809268.6mS, freq adjust 0
May 24 17:36:32 RuckusAP daemon.info channel-wifi0: init: (80:03:84:10:1d:48) interval=15
May 24 17:36:32 RuckusAP daemon.info channel-wifi0: unable to find active wlan device for wifi0
May 24 17:36:33 RuckusAP daemon.info channel-wifi1: init: (80:03:84:10:1d:4c) interval=15
May 24 17:36:33 RuckusAP daemon.info channel-wifi1: unable to find active wlan device for wifi1
May 24 17:36:34 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 1536
May 24 17:36:40 RuckusAP daemon.warn Eved: Last Reboot Reason: user reboot
May 24 17:36:43 RuckusAP daemon.info hub_registrar: OCSP: APR lookup timer expired
May 24 17:36:47 RuckusAP kern.warn kernel: [ 72.297459] rks_ioctl: module 27 cmd 3 not supported
May 24 17:36:48 RuckusAP local2.err syslog: Parameter value L2 is invalid for parameter Tunnel-Mode
May 24 17:36:50 RuckusAP local2.err syslog: Failed to retrieve get poe power mode
May 24 17:36:54 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 1536
May 24 17:36:55 RuckusAP authpriv.info dropbear[1228]: Child connection from 192.168.0.160:52467
May 24 17:37:00 RuckusAP authpriv.notice dropbear[1228]: Deferring to RKS shell to authenticate password.
May 24 17:37:01 RuckusAP authpriv.err dropbear[1228]: chown(/dev/ttyp0, 0, 5) failed: Read-only file system
May 24 17:37:01 RuckusAP authpriv.err dropbear[1228]: chmod(/dev/ttyp0, 0620) failed: Read-only file system
May 24 17:37:14 RuckusAP daemon.info hub_registrar: OCSP: Initial curl host ap-registrar.ruckuswireless.com connection check returns failure 1536
May 24 17:37:16 RuckusAP local2.err syslog: AP get the broadcast ip in its subnet, the broadcast ip is 192.168.0.255
May 24 17:37:17 RuckusAP kern.warn kernel: [ 102.241119] rks_ioctl: module 27 cmd 3 not supported
May 24 17:37:23 RuckusAP daemon.err cubic[759]: wrap_getaddrinfo:1034 Address [RuckusController.xxxxxxx.net] is invalid address.[-2: Name or service not known].
OK
rkscli: