Please login to access that KB Article

APs in upgrade loop after ZD1200 updated to 10.5.1.0 build 124

Summary

APs are stuck in an upgrade loop after ZoneDirector (ZD) is upgraded to version 10.5.1.0.124.

Question

Why are APs stuck in a disconnected state and continuously upgrading firmware after the ZD 10.5.1 upgrade?

Customer Environment

Zone Director 1200 10.5.1.0.124

Symptoms

  • ZoneDirector attempts to upgrade and reboot the AP up to 16 times.
  • AP logs show repeated connection failures:
wget: cannot connect to remote host (10.53.21.30): Connection refused
Firmware update error(252)
Control File Download Error
    
    

    Root Cause

    Starting with release 10.5.1.0.124, as a security enhancement, FTP is disabled by default and replaced with HTTPS for AP image upgrades.

    Troubleshooting Steps

    • Confirm HTTPS end to end traffic is allowed between AP and Zone Director
    • Using AP CLI confirm the following
    AP is running official build
      # get version
    AP firmware file transfer paramters looks correct and was not customized
      # fw show
    • AP log reference
    Dec 23 09:21:54 PartnerArea daemon.info Firmware Daemon[698]: rfw.c:507 do_fw() **(698) wget: cannot connect to remote host (10.53.21.30): Connection refused
    Dec 23 09:21:54 PartnerArea local2.err syslog: Firmware update error(252)
    Dec 23 09:21:57 PartnerArea daemon.info Firmware Daemon[701]: rfw.c:456 do_fw() fw: Updating rcks_wlan.bkup ...
    Dec 23 09:21:57 PartnerArea daemon.info Firmware Daemon[701]: rks_fw_update.c:4531 v54_fw_update() v54_fw_update: download 10.53.21.30 section=rcks_fw.main image=Image2 ctl_file=r500/control (/writable/fw/main.cntl) local=0
    Dec 23 09:21:57 PartnerArea daemon.notice Firmware Daemon[701]: working to update main|wget: cannot connect to remote host (10.53.21.30): Connection refused
    Dec 23 09:21:57 PartnerArea daemon.notice Firmware Daemon[701]: working to update main|wget: cannot connect to remote host (10.53.21.30): Connection refused
    Dec 23 09:21:57 PartnerArea daemon.info Firmware Daemon[701]: rks_fw_update.c:403 net_get_buf() NET_CLOSE() rc1=1
    Dec 23 09:21:57 PartnerArea daemon.err Firmware Daemon[701]: rks_fw_update.c:4626 v54_fw_update() Error: could not get control file
    Dec 23 09:21:57 PartnerArea daemon.notice Firmware Daemon[701]: failed|[Control File] wget: cannot connect to remote host (10.53.21.30): Connection refused
    Dec 23 09:21:57 PartnerArea daemon.info Firmware Daemon[701]: rfw.c:497 do_fw() **fw(701) : Control File Download Error
    • On the Zone Director, confirmed FTP is disabled with the following ZD CLI commands
    #config 
    #system 
    #show FTP Server: 
    Status= Disabled 
    Anonynous Status= Disabled

    Workaround

    • If urgent and unable to determine HTTPS path or firewall issue, one may enable FTP on the Zone Director via CLI
    #config
    #system
    #ftp
    #exit
    • Disable FTP after AP firmware update is complete

    Resolution

    • Beginning with Zone Director 10.5.1, the AP image upgrade uses HTTPS. If there is an upgrade failure using HTTPS, you can enable the legacy AP image upgrade option to FTP under Administrator > Upgrade tab. Zone Director supports either HTTPS or FTP as the AP image upgrade option

      User-added image

      Note: Ruckus always recommends its customers to Refer to the Release Notes and Upgrade Guides for the best practices and changed behavior before performing an upgrade.
    • Allow HTTPS protocol in firewall between AP and Zone Director
    • Please contact technical support if further assistance is needed

    Related Articles

    https://support.ruckuswireless.com/documents/4046-zonedirector-10-5-1-0-124-ga-release-notes

    Article Number:
    000012030

    Updated:
    December 23, 2025 06:44 AM (5 months ago)

    Tags:
    Firmware, Troubleshooting, Known Issues and Workarounds, ZoneDirector 1200

    Votes:
    3

    This article is:
    helpful
    not helpful

    Working...Please wait

    This is here to prevent you from accidentally submitting twice.

    The page will automatically refresh.

    Alert!!

    Close