大家好!AP在AC上注册不上,按ctrl+B,进入bootrom,再按ctrl+F格式化ap后再启动,就启动了不了,提示以下信息。
BootWare Validating...
Press Ctrl+B to enter extended boot menu...
Starting to get the main application file--flash:/wa2600a_fit.bin!
The main application file does not exist--flash:/wa2600a_fit.bin!
Starting to get the backup application file--flash:/backup.bin!
The backup application file does not exist--flash:/backup.bin!
Starting to get the secure application file--flash:/secure.bin!
The secure application file does not exist--flash:/secure.bin!
Booting App fails!
Trying to get the IP address from the DHCP server......
Getting IP Address Failed, the system will reboot.
[State : Idle] Reset re
System is starting...
Press Ctrl+D to access BASIC-BOOTWARE MENU
Booting Normal Extend BootWare....
The Extend BootWare is self-decompressing..........................Done!
(0)
最佳答案
如果是fit ap和AC组网,需要FIT AP能够拿到正确的IP地址,你的信息里面AP无法通过DHCP获取IP地址,也就无法与AC通信,无法通过AC下载软件版本。所以这个问题第一步需要解决AP获取IP地址的问题。
(0)
你好!AC的配置是这样,你看DHCP配置有问题吗? <ap>disp cu # version 5.20, Release 3507P22 # sysname ap # domain default enable system # telnet server enable # port-security enable # oap management-ip 192.168.0.101 slot 0 # wlan auto-ap enable # password-recovery enable # vlan 1 # vlan 4000 to 4001 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool vlan4000 network 10.80.255.0 mask 255.255.255.0 gateway-list 10.80.255.254 # dhcp server ip-pool vlan4001 network 10.80.254.0 mask 255.255.255.0 gateway-list 10.80.254.254 dns-list 218.201.4.3 61.128.192.68 # user-group system group-attribute allow-guest # local-user admin password cipher $c$3$8xKWRHUPd5zq8q0oa34NOyPJ7ijpZod3 authorization-attribute level 3 service-type telnet # wlan rrm dot11a mandatory-rate 6 12 24 dot11a supported-rate 9 18 36 48 54 dot11b mandatory-rate 1 2 dot11b supported-rate 5.5 11 dot11g mandatory-rate 1 2 5.5 11 dot11g supported-rate 6 9 12 18 24 36 48 54 # wlan service-template 2 crypto ssid xxk bind WLAN-ESS 1 cipher-suite tkip security-ie wpa service-template enable # wlan ap-group default_group ap cqzc ap 7425-8a8b-0ba0 # interface Bridge-Aggregation1 port link-type trunk port trunk permit vlan all # interface NULL0 # interface Vlan-interface4000 ip address 10.80.255.254 255.255.255.0 # interface Vlan-interface4001 ip address 10.80.254.254 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk port trunk permit vlan all port link-aggregation group 1 # interface GigabitEthernet1/0/2 port link-type trunk port trunk permit vlan all port link-aggregation group 1 # interface WLAN-ESS1 port access vlan 4001 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$Z+1S5gua91CIURxi+h5CEC3F9Mi L4/774hf/ew== # wlan ap 7425-8a8b-0ba0 model WA2620i-AGN id 2 serial-id 219801A0CNC141002960 radio 1 service-template 2 radio enable radio 2 service-template 2 radio enable # wlan ap cqzc model WA2620i-AGN id 1 serial-id auto radio 1 service-template 2 radio enable radio 2 service-template 2 radio enable # wlan ips malformed-detect-policy default signature deauth_flood signature-id 1 signature broadcast_deauth_flood signature-id 2 signature disassoc_flood signature-id 3 signature broadcast_disassoc_flood signature-id 4 signature eapol_logoff_flood signature-id 5 signature eap_success_flood signature-id 6 signature eap_failure_flood signature-id 7 signature pspoll_flood signature-id 8 signature cts_flood signature-id 9 signature rts_flood signature-id 10 signature addba_req_flood signature-id 11 signature-policy default countermeasure-policy default attack-detect-policy default virtual-security-domain default attack-detect-policy default malformed-detect-policy default signature-policy default countermeasure-policy default # ip route-static 0.0.0.0 0.0.0.0 10.80.254.252 # dhcp enable # user-interface con 0 user-interface vty 0 4 authentication-mode scheme user privilege level 3 # return <ap>
亲~登录后才可以操作哦!
确定你的邮箱还未认证,请认证邮箱或绑定手机后进行当前操作
举报
×
侵犯我的权益
×
侵犯了我企业的权益
×
抄袭了我的内容
×
原文链接或出处
诽谤我
×
对根叔社区有害的内容
×
不规范转载
×
举报说明
你好!AC的配置是这样,你看DHCP配置有问题吗? <ap>disp cu # version 5.20, Release 3507P22 # sysname ap # domain default enable system # telnet server enable # port-security enable # oap management-ip 192.168.0.101 slot 0 # wlan auto-ap enable # password-recovery enable # vlan 1 # vlan 4000 to 4001 # domain system access-limit disable state active idle-cut disable self-service-url disable # dhcp server ip-pool vlan4000 network 10.80.255.0 mask 255.255.255.0 gateway-list 10.80.255.254 # dhcp server ip-pool vlan4001 network 10.80.254.0 mask 255.255.255.0 gateway-list 10.80.254.254 dns-list 218.201.4.3 61.128.192.68 # user-group system group-attribute allow-guest # local-user admin password cipher $c$3$8xKWRHUPd5zq8q0oa34NOyPJ7ijpZod3 authorization-attribute level 3 service-type telnet # wlan rrm dot11a mandatory-rate 6 12 24 dot11a supported-rate 9 18 36 48 54 dot11b mandatory-rate 1 2 dot11b supported-rate 5.5 11 dot11g mandatory-rate 1 2 5.5 11 dot11g supported-rate 6 9 12 18 24 36 48 54 # wlan service-template 2 crypto ssid xxk bind WLAN-ESS 1 cipher-suite tkip security-ie wpa service-template enable # wlan ap-group default_group ap cqzc ap 7425-8a8b-0ba0 # interface Bridge-Aggregation1 port link-type trunk port trunk permit vlan all # interface NULL0 # interface Vlan-interface4000 ip address 10.80.255.254 255.255.255.0 # interface Vlan-interface4001 ip address 10.80.254.254 255.255.255.0 # interface GigabitEthernet1/0/1 port link-type trunk port trunk permit vlan all port link-aggregation group 1 # interface GigabitEthernet1/0/2 port link-type trunk port trunk permit vlan all port link-aggregation group 1 # interface WLAN-ESS1 port access vlan 4001 port-security port-mode psk port-security tx-key-type 11key port-security preshared-key pass-phrase cipher $c$3$Z+1S5gua91CIURxi+h5CEC3F9Mi L4/774hf/ew== # wlan ap 7425-8a8b-0ba0 model WA2620i-AGN id 2 serial-id 219801A0CNC141002960 radio 1 service-template 2 radio enable radio 2 service-template 2 radio enable # wlan ap cqzc model WA2620i-AGN id 1 serial-id auto radio 1 service-template 2 radio enable radio 2 service-template 2 radio enable # wlan ips malformed-detect-policy default signature deauth_flood signature-id 1 signature broadcast_deauth_flood signature-id 2 signature disassoc_flood signature-id 3 signature broadcast_disassoc_flood signature-id 4 signature eapol_logoff_flood signature-id 5 signature eap_success_flood signature-id 6 signature eap_failure_flood signature-id 7 signature pspoll_flood signature-id 8 signature cts_flood signature-id 9 signature rts_flood signature-id 10 signature addba_req_flood signature-id 11 signature-policy default countermeasure-policy default attack-detect-policy default virtual-security-domain default attack-detect-policy default malformed-detect-policy default signature-policy default countermeasure-policy default # ip route-static 0.0.0.0 0.0.0.0 10.80.254.252 # dhcp enable # user-interface con 0 user-interface vty 0 4 authentication-mode scheme user privilege level 3 # return <ap>