This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Cannot connect AP10 to new SG230 - uninitialized value in concatenation error

Hello,

I am actually a customer of sophos, I have an old ASG 220 rev. 5. Last week I asked my reseller a demo unit of SG 230 with firmware version 9.408-4. All seems to work fine, except for Wireless feature. I tried to connect 2 AP 10, but they are always seen as inactive, even if I accepted them in Access Point pending list.

Reading the log file, it seems that new firmware of AP 10 should be installed, but I got the error Use of uninitialized value in concatenation (.) or string at awed_ng.pl line 347. I read in this forum that in some cases the ap are not stable, but in my case they didn't work at all.

I tried also to recover ap firmware with the recovery tool, but the issue is the same.

I'm posting the log file, any help is apreciated.

Thanks

2016:12:06-10:30:13 firewall awed[12247]: [MASTER] awed_ng starting
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP10: axg9400_wifi-745ce15-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP100: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP100C: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP100X: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP15: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP15C: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP30: axg9400_wifi-745ce15-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP5: 1
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP50: axg9400_wifi-745ce15-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP55: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for AP55C: axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] new firmware detected for RED15w: 1
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] access point firmware available: AP15C:axg9400_wifi-cb61259-4d51006 AP10:axg9400_wifi-745ce15-4d51006 AP55C:axg9400_wifi-cb61259-4d51006 RED15w:1 AP5:1 AP30:axg9400_wifi-745ce15-4d51006 AP100C:axg9400_wifi-cb61259-4d51006 AP100X:axg9400_wifi-cb61259-4d51006 AP50:axg9400_wifi-745ce15-4d51006 AP55:axg9400_wifi-cb61259-4d51006 AP15:axg9400_wifi-cb61259-4d51006 AP100:axg9400_wifi-cb61259-4d51006
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] Generating SSH RSA keypair.
2016:12:06-10:30:13 firewall awed[12247]: [MASTER] Generating SSH ECDSA keypair.
2016:12:06-10:30:14 firewall awed[12247]: [MASTER] start processing configuration change
2016:12:06-10:30:14 firewall awed[12247]: [MASTER] end processing configuration change
2016:12:06-10:30:17 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:52381
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:41301
2016:12:06-10:30:53 firewall awed[12431]: WARN -------------------------------------------------------
2016:12:06-10:30:53 firewall awed[12431]: Use of uninitialized value in concatenation (.) or string at awed_ng.pl line 347.
2016:12:06-10:30:53 firewall awed[12431]: 1 main::awed_aphandler
2016:12:06-10:30:53 firewall awed[12431]: 1
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] new AP with ID A40000EE4E91D04
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] start processing configuration change
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] AP A40000EE4E91D04: Local metadata updated
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] AP A40000EE4E91D04: Configuration change detected
2016:12:06-10:30:53 firewall awed[12247]: [MASTER] end processing configuration change
2016:12:06-10:31:30 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:41301
2016:12:06-10:31:30 firewall awed[12564]: [A40000EE4E91D04] AP10 from 192.168.xxx.122:41301 identified as A40000EE4E91D04
2016:12:06-10:31:30 firewall awed[12564]: [A40000EE4E91D04] (Re-)loaded identity and/or configuration
2016:12:06-10:31:30 firewall awed[12564]: [A40000EE4E91D04] device not authorized yet, dropping.
2016:12:06-10:32:44 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:41301
2016:12:06-10:32:44 firewall awed[12706]: [A40000EE4E91D04] AP10 from 192.168.xxx.122:41301 identified as A40000EE4E91D04
2016:12:06-10:32:44 firewall awed[12706]: [A40000EE4E91D04] (Re-)loaded identity and/or configuration
2016:12:06-10:32:44 firewall awed[12706]: [A40000EE4E91D04] device not authorized yet, dropping.
2016:12:06-10:33:17 firewall awed[12247]: [MASTER] start processing configuration change
2016:12:06-10:33:17 firewall awed[12247]: [MASTER] AP A40000EE4E91D04: Local metadata updated
2016:12:06-10:33:17 firewall awed[12247]: [MASTER] AP A40000EE4E91D04: Configuration change detected
2016:12:06-10:33:17 firewall awed[12247]: [MASTER] end processing configuration change
2016:12:06-10:33:29 firewall awed[12247]: [MASTER] start processing configuration change
2016:12:06-10:33:29 firewall awed[12247]: [MASTER] end processing configuration change
2016:12:06-10:33:58 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:41301
2016:12:06-10:33:59 firewall awed[13121]: [A40000EE4E91D04] AP10 from 192.168.xxx.122:41301 identified as A40000EE4E91D04
2016:12:06-10:33:59 firewall awed[13121]: [A40000EE4E91D04] (Re-)loaded identity and/or configuration
2016:12:06-10:34:00 firewall awed[13121]: [A40000EE4E91D04] ll_read: short read or connection error:
2016:12:06-10:34:00 firewall awed[13121]: [A40000EE4E91D04] disconnected. Close socket and kill process.
2016:12:06-10:34:33 firewall awed[12247]: [MASTER] new connection from 192.168.xxx.122:41301
2016:12:06-10:34:33 firewall awed[13156]: [A40000EE4E91D04] AP10 from 192.168.xxx.122:41301 identified as A40000EE4E91D04



This thread was automatically locked due to age.
Parents
  • Hi, David, and welcome to the UTM Community!

    Since you're considering a new purchase, you can access Sophos Sales to get help from a pre-sales Support Engineer.  I suspect that he will suggest that you try re-flashing the APs, but they might not come around.  I bet you could get Sophos and your reseller to make you a good deal on two new AP 15s.  The AP 10s are End-of-Life on 11/30/2017.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Bob,

    I cannot agree to your comment on buying a new AP since the AP10s are end of live next year.

    The AP10s are only access point and even expensive access points because they are manageable by the UTM. No one expects new features for this access points but they have been investments for small companies or home users. They should work until end of live of the electronics inside and not made useless by a crappy firmware update of Sophos.

    As you can see here in this forum, there had been more users hit by this bug, even AP30 users and the only solution found here is that Sophos reinserted an old firmware to a special user and doesn't allow him to make further updates until all is fixed again.

    I was always backing Sophos but this form of upselling is not my understanding of support for costumers.

    So we all know that reflashing does not help. We do not want a good deal, we want our access points work again with a corrected firmware.

    That's just my 2 cents.

    Walter

    cu
    Walter

  • This is the actual error, and the issue has been fixed in 9.410 (NUTM-5567):

    "2016:12:06-10:34:00 firewall awed[13121]: [A40000EE4E91D04] ll_read: short read or connection error: "

Reply Children
No Data