mirror of
				https://github.com/Telecominfraproject/wlan-lanforge-scripts.git
				synced 2025-11-03 20:27:54 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			408 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			408 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
	
	
	
#!/usr/bin/python3
 | 
						|
'''
 | 
						|
LANforge 192.168.100.178
 | 
						|
Controller at 192.168.100.112 admin/Cisco123
 | 
						|
Controller is 192.1.0.10
 | 
						|
AP is on serial port /dev/ttyUSB1  9600 8 n 1
 | 
						|
 | 
						|
make sure pexpect is installed:
 | 
						|
$ sudo yum install python3-pexpect
 | 
						|
 | 
						|
You might need to install pexpect-serial using pip:
 | 
						|
$ pip3 install pexpect-serial
 | 
						|
 | 
						|
$ sudo pip3 install pexpect-serial
 | 
						|
 | 
						|
./cisco_ap_ctl.py 
 | 
						|
'''
 | 
						|
 | 
						|
 | 
						|
import sys
 | 
						|
if sys.version_info[0] != 3:
 | 
						|
    print("This script requires Python 3")
 | 
						|
    exit()
 | 
						|
 | 
						|
import logging
 | 
						|
import time
 | 
						|
from time import sleep
 | 
						|
import argparse
 | 
						|
import pexpect
 | 
						|
import serial
 | 
						|
from pexpect_serial import SerialSpawn
 | 
						|
 | 
						|
# pip install pexpect-serial  (on Ubuntu)
 | 
						|
# sudo pip install pexpect-serial (on Ubuntu for everyone)
 | 
						|
 | 
						|
default_host = "localhost"
 | 
						|
default_ports = {
 | 
						|
    "serial": None,
 | 
						|
    "ssh":   22,
 | 
						|
    "telnet": 23
 | 
						|
}
 | 
						|
NL = "\n"
 | 
						|
CR = "\r\n"
 | 
						|
Q = '"'
 | 
						|
A = "'"
 | 
						|
FORMAT = '%(asctime)s %(name)s %(levelname)s: %(message)s'
 | 
						|
band = "a"
 | 
						|
logfile = "stdout"
 | 
						|
 | 
						|
# regex101.com  , 
 | 
						|
# this will be in the tx_power script
 | 
						|
# ^\s+1\s+6\s+\S+\s+\S+\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+)\s+(\S+) 
 | 
						|
 | 
						|
def usage():
 | 
						|
    print("$0 used connect to Cisco AP:")
 | 
						|
    print("-a|--ap:  AP to act upon")
 | 
						|
    print("-d|--dest:  destination host")
 | 
						|
    print("-o|--port:  destination port")
 | 
						|
    print("-u|--user:  AP login name")
 | 
						|
    print("-p|--pass:  AP password")
 | 
						|
    print("-s|--scheme (serial|telnet|ssh): connect to controller via serial, ssh or telnet")
 | 
						|
    print("--tty Serial port for accessing AP")
 | 
						|
    print("-l|--log file: log messages here")
 | 
						|
    print("-b|--band:  a (5Ghz) or b (2.4Ghz) or abgn for dual-band 2.4Ghz AP")
 | 
						|
    print("-z|--action: action")
 | 
						|
    print("-h|--help")
 | 
						|
 | 
						|
# see https://stackoverflow.com/a/13306095/11014343
 | 
						|
class FileAdapter(object):
 | 
						|
    def __init__(self, logger):
 | 
						|
        self.logger = logger
 | 
						|
    def write(self, data):
 | 
						|
        # NOTE: data can be a partial line, multiple lines
 | 
						|
        data = data.strip() # ignore leading/trailing whitespace
 | 
						|
        if data: # non-blank
 | 
						|
           self.logger.info(data)
 | 
						|
    def flush(self):
 | 
						|
        pass  # leave it to logging to flush properly
 | 
						|
 | 
						|
# Test command if lanforge connected ttyUSB0
 | 
						|
# sudo ./cisco_ap_ctl.py -a lanforge -d 0 -o 0 -u "lanforge" -p "lanforge" -s "serial" -t "/dev/ttyUSB0"
 | 
						|
# sample for lanforge 192.168.100.178
 | 
						|
# sudo ./cisco_ap_ctl.py -a APA53.0E7B.EF9C -d 0 -o 0 -u "admin" -p "Admin123" -s "serial" -t "/dev/ttyUSB2" -z "show_log"
 | 
						|
def main():
 | 
						|
 | 
						|
    global logfile
 | 
						|
 | 
						|
    AP_ESCAPE       = "Escape character is '^]'."
 | 
						|
    AP_USERNAME     = "Username:"
 | 
						|
    AP_PASSWORD     = "Password:"
 | 
						|
    AP_EN           = "en"
 | 
						|
    AP_MORE         = "--More--"
 | 
						|
    AP_EXIT         = "exit"
 | 
						|
    LF_PROMPT       = "$"
 | 
						|
    CR = "\r\n"
 | 
						|
 | 
						|
    
 | 
						|
    parser = argparse.ArgumentParser(description="Cisco AP Control Script")
 | 
						|
    parser.add_argument("-a", "--prompt",  type=str, help="ap prompt")
 | 
						|
    parser.add_argument("-d", "--dest",    type=str, help="address of the AP  172.19.27.55")
 | 
						|
    parser.add_argument("-o", "--port",    type=int, help="control port on the AP, 2008")
 | 
						|
    parser.add_argument("-u", "--user",    type=str, help="credential login/username, admin")
 | 
						|
    parser.add_argument("-p", "--passwd",  type=str, help="credential password Wnbulab@123")
 | 
						|
    parser.add_argument("-s", "--scheme",  type=str, choices=["serial", "ssh", "telnet"], help="Connect via serial, ssh or telnet")
 | 
						|
    parser.add_argument("-t", "--tty",     type=str, help="tty serial device for connecting to AP")
 | 
						|
    parser.add_argument("-l", "--log",     type=str, help="logfile for messages, stdout means output to console",default="stdout")
 | 
						|
    parser.add_argument("-z", "--action",  type=str, help="action,  current action is powercfg")
 | 
						|
    parser.add_argument("-b", "--baud",    type=str, help="action,  baud rate lanforge: 115200  cisco: 9600")
 | 
						|
 | 
						|
    args = None
 | 
						|
    try:
 | 
						|
        args = parser.parse_args()
 | 
						|
        host = args.dest
 | 
						|
        scheme = args.scheme
 | 
						|
        port = (default_ports[scheme], args.port)[args.port != None]
 | 
						|
        user = args.user
 | 
						|
        if (args.log != None):
 | 
						|
            logfile = args.log
 | 
						|
    except Exception as e:
 | 
						|
        logging.exception(e)
 | 
						|
        usage()
 | 
						|
        exit(2)
 | 
						|
    console_handler = logging.StreamHandler()
 | 
						|
    formatter = logging.Formatter(FORMAT)
 | 
						|
    logg = logging.getLogger(__name__)
 | 
						|
    logg.setLevel(logging.DEBUG)
 | 
						|
    file_handler = None
 | 
						|
    if (logfile is not None):
 | 
						|
        if (logfile != "stdout"):
 | 
						|
            file_handler = logging.FileHandler(logfile, "w")
 | 
						|
            file_handler.setLevel(logging.DEBUG)
 | 
						|
            file_handler.setFormatter(formatter)
 | 
						|
            logg.addHandler(file_handler)
 | 
						|
            logging.basicConfig(format=FORMAT, handlers=[file_handler])
 | 
						|
        else:
 | 
						|
            # stdout logging
 | 
						|
            logging.basicConfig(format=FORMAT, handlers=[console_handler])
 | 
						|
    egg = None # think "eggpect"
 | 
						|
    ser = None
 | 
						|
    try:
 | 
						|
        if (scheme == "serial"):
 | 
						|
            #eggspect = pexpect.fdpexpect.fdspan(telcon, logfile=sys.stdout.buffer)
 | 
						|
            ser = serial.Serial(args.tty, int(args.baud), timeout=5)
 | 
						|
            print("Created serial connection on %s, open: %s"%(args.tty, ser.is_open))
 | 
						|
            egg = SerialSpawn(ser)
 | 
						|
            egg.logfile = FileAdapter(logg)
 | 
						|
            time.sleep(1)
 | 
						|
            egg.sendline(CR)
 | 
						|
            time.sleep(1)
 | 
						|
 | 
						|
        elif (scheme == "ssh"):
 | 
						|
            if (port is None):
 | 
						|
                port = 22
 | 
						|
            cmd = "ssh -p%d %s@%s"%(port, user, host)
 | 
						|
            logg.info("Spawn: "+cmd+NL)
 | 
						|
            egg = pexpect.spawn(cmd)
 | 
						|
            #egg.logfile_read = sys.stdout.buffer
 | 
						|
            egg.logfile = FileAdapter(logg)
 | 
						|
        elif (scheme == "telnet"):
 | 
						|
            if (port is None):
 | 
						|
                port = 23
 | 
						|
            cmd = "telnet {} {}".format(host, port)
 | 
						|
            logg.info("Spawn: "+cmd+NL)
 | 
						|
            egg = pexpect.spawn(cmd)
 | 
						|
            egg.logfile = FileAdapter(logg)
 | 
						|
            # Will login below as needed.
 | 
						|
        else:
 | 
						|
            usage()
 | 
						|
            exit(1)
 | 
						|
    except Exception as e:
 | 
						|
        logging.exception(e)
 | 
						|
    
 | 
						|
    AP_PROMPT       = "{}>".format(args.prompt)
 | 
						|
    AP_HASH         = "{}#".format(args.prompt)
 | 
						|
    time.sleep(0.1)
 | 
						|
    logged_in  = False
 | 
						|
    loop_count = 0
 | 
						|
    while (loop_count <= 8 and logged_in == False):
 | 
						|
        loop_count += 1
 | 
						|
        i = egg.expect_exact([AP_ESCAPE,AP_PROMPT,AP_HASH,AP_USERNAME,AP_PASSWORD,AP_MORE,LF_PROMPT,pexpect.TIMEOUT],timeout=5)
 | 
						|
        if i == 0:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_ESCAPE,i,egg.before,egg.after))
 | 
						|
            egg.sendline(CR) # Needed after Escape or should just do timeout and then a CR?
 | 
						|
            sleep(1)
 | 
						|
        if i == 1:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_PROMPT,i,egg.before,egg.after))
 | 
						|
            egg.sendline(AP_EN) 
 | 
						|
            sleep(1)
 | 
						|
            j = egg.expect_exact([AP_PASSWORD,pexpect.TIMEOUT],timeout=5)
 | 
						|
            if j == 0:
 | 
						|
                logg.info("Expect: {} i: {} j: {} before: {} after: {}".format(AP_PASSWORD,i,j,egg.before,egg.after))
 | 
						|
                egg.sendline(args.passwd) 
 | 
						|
                sleep(1)
 | 
						|
                k = egg.expect_exact([AP_HASH,pexpect.TIMEOUT],timeout=5)
 | 
						|
                if k == 0:
 | 
						|
                    logg.info("Expect: {} i: {} j: {} k: {} before: {} after: {}".format(AP_PASSWORD,i,j,k,egg.before,egg.after))
 | 
						|
                    logged_in = True
 | 
						|
                if k == 1:
 | 
						|
                    logg.info("Expect: {} i: {} j: {} k: {} before: {} after: {}".format("Timeout",i,j,k,egg.before,egg.after))
 | 
						|
            if j == 1:
 | 
						|
                logg.info("Expect: {} i: {} j: {} before: {} after: {}".format("Timeout",i,j,egg.before,egg.after))
 | 
						|
 | 
						|
        if i == 2:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_HASH,i,egg.before,egg.after))
 | 
						|
            logged_in = True 
 | 
						|
            sleep(1)
 | 
						|
        if i == 3:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_USERNAME,i,egg.before,egg.after))
 | 
						|
            egg.sendline(args.user) 
 | 
						|
            sleep(1)
 | 
						|
        if i == 4:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_PASSWORD,i,egg.before,egg.after))
 | 
						|
            egg.sendline(args.passwd) 
 | 
						|
            sleep(1)
 | 
						|
        if i == 5:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(AP_MORE,i,egg.before,egg.after))
 | 
						|
            if (scheme == "serial"):
 | 
						|
                egg.sendline("r")
 | 
						|
            else:
 | 
						|
                egg.sendcontrol('c')
 | 
						|
            sleep(1)
 | 
						|
        # for Testing serial connection using Lanforge
 | 
						|
        if i == 6:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format(LF_PROMPT,i,egg.before.decode('utf-8', 'ignore'),egg.after.decode('utf-8', 'ignore')))
 | 
						|
            if (loop_count < 3):
 | 
						|
                egg.send("ls -lrt")
 | 
						|
                sleep(1)
 | 
						|
            if (loop_count > 4):
 | 
						|
                logged_in = True # basically a test mode using lanforge serial
 | 
						|
        if i == 7:
 | 
						|
            logg.info("Expect: {} i: {} before: {} after: {}".format("Timeout",i,egg.before,egg.after))
 | 
						|
            egg.sendline(CR) 
 | 
						|
            sleep(1)
 | 
						|
 | 
						|
 | 
						|
    if (args.action == "powercfg"):
 | 
						|
        logg.info("execute: show controllers dot11Radio 1 powercfg | g T1")
 | 
						|
        egg.sendline('show controllers dot11Radio 1 powercfg | g T1')
 | 
						|
        egg.expect([pexpect.TIMEOUT], timeout=3)  # do not delete this for it allows for subprocess to see output
 | 
						|
        print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        i = egg.expect_exact([AP_MORE,pexpect.TIMEOUT],timeout=5)
 | 
						|
        if i == 0:
 | 
						|
            egg.sendcontrol('c')
 | 
						|
        if i == 1:
 | 
						|
            logg.info("send cntl c anyway")
 | 
						|
            egg.sendcontrol('c')
 | 
						|
 | 
						|
    elif (args.action == "clear_log"):
 | 
						|
        logg.info("execute: clear log")
 | 
						|
        egg.sendline('clear log')
 | 
						|
        sleep(0.4)
 | 
						|
        egg.sendline('show log')
 | 
						|
        egg.expect([pexpect.TIMEOUT], timeout=2)  # do not delete this for it allows for subprocess to see output
 | 
						|
        print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        # allow for normal logout below
 | 
						|
 | 
						|
    elif (args.action == "show_log"):
 | 
						|
        logg.info("execute: show log")
 | 
						|
        egg.sendline('show log')
 | 
						|
        sleep(0.4)
 | 
						|
        egg.expect([pexpect.TIMEOUT], timeout=2)  # do not delete this for it allows for subprocess to see output
 | 
						|
        print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        i = egg.expect_exact([AP_MORE,pexpect.TIMEOUT],timeout=4)
 | 
						|
        if i == 0:
 | 
						|
            egg.sendline('r')
 | 
						|
            egg.expect([pexpect.TIMEOUT], timeout=4)  # do not delete this for it allows for subprocess to see output
 | 
						|
            print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        if i == 1:
 | 
						|
            print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        # allow for normal logout below
 | 
						|
        # show log | g DOT11_DRV
 | 
						|
 | 
						|
    # CAC_EXPIRY_EVT: CAC finished on DFS channel 52
 | 
						|
    elif (args.action == "cac_expiry_evt"):
 | 
						|
        logg.info("execute: show log | g CAC_EXPIRY_EVT")    
 | 
						|
        egg.sendline('show log | g CAC_EXPIRY_EVT')
 | 
						|
        sleep(0.4)
 | 
						|
        egg.expect([pexpect.TIMEOUT], timeout=2)  # do not delete this for it allows for subprocess to see output
 | 
						|
        print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        i = egg.expect_exact([AP_MORE,pexpect.TIMEOUT],timeout=4)
 | 
						|
        if i == 0:
 | 
						|
            egg.sendline('r')
 | 
						|
            egg.expect([pexpect.TIMEOUT], timeout=4)  # do not delete this for it allows for subprocess to see output
 | 
						|
            print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
        if i == 1:
 | 
						|
            print(egg.before.decode('utf-8', 'ignore')) # do not delete this for it  allows for subprocess to see output
 | 
						|
 | 
						|
    else: # no other command at this time so send the same power command
 | 
						|
        #logg.info("no action so execute: show controllers dot11Radio 1 powercfg | g T1")
 | 
						|
        logg.info("no action")
 | 
						|
 | 
						|
    i = egg.expect_exact([AP_PROMPT,AP_HASH,pexpect.TIMEOUT],timeout=1)
 | 
						|
    if i == 0:
 | 
						|
        logg.info("received {} we are done send exit".format(AP_PROMPT))
 | 
						|
        egg.sendline(AP_EXIT)
 | 
						|
    if i == 1:
 | 
						|
        logg.info("received {} send exit".format(AP_HASH))
 | 
						|
        egg.sendline(AP_EXIT)
 | 
						|
    if i == 2:
 | 
						|
        logg.info("timed out waiting for {} or {}".format(AP_PROMPT,AP_HASH))
 | 
						|
        
 | 
						|
    #             ctlr.execute(cn_cmd)
 | 
						|
 | 
						|
''' NOTES for AP DFS
 | 
						|
 | 
						|
Password: [*02/09/2021 14:30:04.2290] Radio [1] Admininstrative state ENABLED  change to DISABLED 
 | 
						|
[*02/09/2021 14:30:04.2300] DOT11_DRV[1]: Stop Radio1
 | 
						|
[*02/09/2021 14:30:04.2520] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
[*02/09/2021 14:30:04.2740] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
[*02/09/2021 14:30:04.2740] Stopped Radio 1
 | 
						|
[*02/09/2021 14:30:36.2810] Radio [1] Admininstrative state DISABLED  change to ENABLED 
 | 
						|
[*02/09/2021 14:30:36.3160] DOT11_DRV[1]: set_channel Channel set to 52/20  <<<<<<   ????
 | 
						|
[*02/09/2021 14:30:36.3390] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:36.4420] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:36.5440] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:36.6490] DOT11_DRV[1]: DFS CAC timer enabled time 60   <<<<<<  ????
 | 
						|
[*02/09/2021 14:30:37.2100] wl0: wlc_iovar_ext: vap_amsdu_rx_max: BCME -23
 | 
						|
[*02/09/2021 14:30:37.2100] wl: Unsupported
 | 
						|
[*02/09/2021 14:30:37.2100] ERROR: return from vap_amsdu_rx_max was -45
 | 
						|
[*02/09/2021 14:30:37.4100] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:37.5040] DOT11_CFG[1]: Starting radio 1
 | 
						|
[*02/09/2021 14:30:37.5050] DOT11_DRV[1]: Start Radio1                             <<<<<<<<<
 | 
						|
[*02/09/2021 14:30:37.5120] DOT11_DRV[1]: set_channel Channel set to 52/20
 | 
						|
[*02/09/2021 14:30:37.5340] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:37.6360] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:37.7370] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:37.8410] DOT11_DRV[1]: DFS CAC timer enabled time 60              <<<<<<<
 | 
						|
[*02/09/2021 14:30:37.8650] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 14:30:37.9800] changed to DFS channel 52, running CAC for 60 seconds.   <<<<<  Note use this one
 | 
						|
[*02/09/2021 14:30:38.0020] Started Radio 1                                          <<<<< After start radio
 | 
						|
[*02/09/2021 14:31:07.4650] wl0: wlc_iovar_ext: olpc_cal_force: BCME -16
 | 
						|
[*02/09/2021 14:31:38.4210] CAC_EXPIRY_EVT: CAC finished on DFS channel 52    <<<<<<   Start with this very unique CAC finished 
 | 
						|
[*02/09/2021 14:31:48.2850] chatter: client_ip_table :: ClientIPTable no client entry found, dropping packet 04:F0:21:F
 | 
						|
 | 
						|
# note lf_hackrf.py begins transmitting immediately... see if that is what is to happen?
 | 
						|
 | 
						|
[*02/09/2021 15:20:53.7470] wcp/dfs :: RadarDetection: radar detected       <<<<<  Radar detected
 | 
						|
[*02/09/2021 15:20:53.7470] wcp/dfs :: RadarDetection: sending packet out to capwapd, slotId=1, msgLen=386, chanCnt=1 2
 | 
						|
[*02/09/2021 15:20:53.7720] DOT11_DRV[1]: DFS CAC timer disabled time 0
 | 
						|
[*02/09/2021 15:20:53.7780] Enabling Channel and channel width Switch Announcement on current channel 
 | 
						|
[*02/09/2021 15:20:53.7870] DOT11_DRV[1]: set_dfs Channel set to 36/20, CSA count 6         <<<<<<<   Channel Set
 | 
						|
[*02/09/2021 15:20:53.8530] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
 | 
						|
 | 
						|
Trying another station
 | 
						|
*02/09/2021 15:25:32.6130] Radio [1] Admininstrative state ENABLED  change to DISABLED 
 | 
						|
[*02/09/2021 15:25:32.6450] DOT11_DRV[1]: Stop Radio1
 | 
						|
[*02/09/2021 15:25:32.6590] Stopped Radio 1
 | 
						|
[*02/09/2021 15:25:52.1700] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:04.6640] Radio [1] Admininstrative state DISABLED  change to ENABLED 
 | 
						|
[*02/09/2021 15:26:04.6850] DOT11_DRV[1]: set_channel Channel set to 36/20
 | 
						|
[*02/09/2021 15:26:04.7070] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:04.8090] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:04.9090] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:05.5620] wl0: wlc_iovar_ext: vap_amsdu_rx_max: BCME -23
 | 
						|
[*02/09/2021 15:26:05.5620] wl: Unsupported
 | 
						|
[*02/09/2021 15:26:05.5620] ERROR: return from vap_amsdu_rx_max was -45
 | 
						|
[*02/09/2021 15:26:05.7600] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:05.8530] DOT11_CFG[1]: Starting radio 1
 | 
						|
[*02/09/2021 15:26:05.8540] DOT11_DRV[1]: Start Radio1
 | 
						|
[*02/09/2021 15:26:05.8610] DOT11_DRV[1]: set_channel Channel set to 36/20
 | 
						|
[*02/09/2021 15:26:05.8830] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:05.9890] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:06.0900] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:06.2080] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:26:06.5350] Started Radio 1
 | 
						|
[*02/09/2021 15:26:15.9750] chatter: client_ip_table :: ClientIPTable no client entry found, dropping packet 04:F0:21:
 | 
						|
 | 
						|
 | 
						|
 | 
						|
 | 
						|
Username: [*02/09/2021 15:33:49.8680] Radio [1] Admininstrative state ENABLED  change to DISABLED 
 | 
						|
[*02/09/2021 15:33:49.9010] DOT11_DRV[1]: Stop Radio1
 | 
						|
[*02/09/2021 15:33:49.9160] Stopped Radio 1
 | 
						|
[*02/09/2021 15:34:14.4150] DOT11_DRV[1]: set_channel Channel set to 56/20
 | 
						|
[*02/09/2021 15:34:14.4370] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:14.5390] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:14.6400] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:14.7450] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
[*02/09/2021 15:34:21.9160] Radio [1] Admininstrative state DISABLED  change to ENABLED 
 | 
						|
[*02/09/2021 15:34:21.9370] DOT11_DRV[1]: set_channel Channel set to 56/20
 | 
						|
[*02/09/2021 15:34:21.9590] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:22.0610] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:22.1610] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:22.2650] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
[*02/09/2021 15:34:22.8270] wl0: wlc_iovar_ext: vap_amsdu_rx_max: BCME -23
 | 
						|
[*02/09/2021 15:34:22.8270] wl: Unsupported
 | 
						|
[*02/09/2021 15:34:22.8270] ERROR: return from vap_amsdu_rx_max was -45
 | 
						|
[*02/09/2021 15:34:23.0280] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:23.1210] DOT11_CFG[1]: Starting radio 1
 | 
						|
[*02/09/2021 15:34:23.1210] DOT11_DRV[1]: Start Radio1
 | 
						|
[*02/09/2021 15:34:23.1280] DOT11_DRV[1]: set_channel Channel set to 56/20
 | 
						|
[*02/09/2021 15:34:23.1510] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:23.2520] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:23.3520] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:23.4560] DOT11_DRV[1]: DFS CAC timer enabled time 60
 | 
						|
[*02/09/2021 15:34:23.4800] wlc_ucode_download: wl0: Loading 129 MU ucode
 | 
						|
[*02/09/2021 15:34:23.5960] changed to DFS channel 56, running CAC for 60 seconds.
 | 
						|
[*02/09/2021 15:34:23.6180] Started Radio 1
 | 
						|
 | 
						|
'''
 | 
						|
if __name__ == '__main__':
 | 
						|
    main()
 | 
						|
 | 
						|
####
 | 
						|
####
 | 
						|
####
 |