Monday, August 17, 2015

CONVERT A CISCO AIR-LAP1142N-A-K9 TO AUTONOMOUS AP

Here is a easy and quick way to convert the AIR-LAP1142N-A-K9 TO AUTONOMOUS AP.

This is a method without configure the IP address of the AP as shown below.

Setting the default IP address and copying to the flash of the AP didn't work for me.  I was not able to communicate with the AP on the 10.0.0.1 address. For example:
ap: set IP_ADDR 10.0.0.1
ap: set NETMASK 255.0.0.0
ap: set DEFAULT_ROUTER 10.0.0.2
ap: tftp_init
ap: ether_init
ap: flash_init
ap: tar -xtract tftp://10.0.0.2/c1140-k9w7-tar.124-25d.JA.tar flash:
ap: set BOOT flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA

ap: boot

Here are the steps to follow:
1. Install Klever TfTP on your computer
2. Download the standalone Autonomous version of the image software.
3. Configure the TFTP server on the computer; Copy the image software from (Step 2) to the tftp directory and rename it "c1140-k9w7-tar.default" or the name of the image it tries to default to.  When the AP boots it will load extract the image and delete the existing image.  (see below screen capture)
4. Configure your laptop’s Ethernet connection to use static IP 10.0.0.2 with netmask 255.0.0.0, NO Default Gateway/Router;  The idea is to place the both the AP and the computer on the same LAN without blocking any network traffic .
5. Connect your computer Ethernet cable to the switch and connect the other cable from your AP (Ethernet port) to the switch. Power on the switch;
6. Connect your AP’s Ethernet port to the switch;
— With the above a few steps your TFTP server is ready to serve the image software
Next:
7. Connect your Cisco serial console cable to your System. Connect the Cisco serial console cable to the Console port of the AP;
8. Open your Terminal program such as Tera Term and configure the serial communication port
9. Hold down your “Mode” button of the AP while plugging in the power of the AP;
10. You can see now see the Terminal is displaying the AP startup messages. Keep holding the Mode button until you see the AP showing the red light, then release the Mode button.  You will see the message "button is pressed, wait for button to be released...button pressed for 27 seconds"
11. On the Terminal window, you will see it’s trying to load the software recovery image from the TFTP server at 255.255.255.255
Screen capture Output:
using  eeprom values

WRDTR,CLKTR: 0x86000800 0x40000000
RQDC ,RFDC : 0x8000003b 0x00000212

ddr init done

IOS Bootloader - Starting system.
Xmodem file system is available.

DDR values used from system serial eeprom.
WRDTR,CLKTR: 0x86000800, 0x40000000
RQDC, RFDC : 0x8000003b, 0x00000212

PCIE0: link is up.
PCIE0: VC0 is active
PCIE1: link is up.
PCIE1: VC0 is active
PCIEx: initialization done
flashfs[0]: 28 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 7382016
flashfs[0]: Bytes available: 25003008
flashfs[0]: flashfs fsck took 20 seconds.
Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: f8:66:f2:44:5a:e4
Ethernet speed is 1000 Mb - FULL duplex
button is pressed, wait for button to be released...
button pressed for 27 seconds
process_config_recovery: set IP address and config to default 10.0.0.1
process_config_recovery: image recovery
image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default

examining image...
extracting info (283 bytes)
Image info:
    Version Suffix: k9w7-.153-3.JBB1
    Image Name: c1140-k9w7-mx.153-3.JBB1
    Version Directory: c1140-k9w7-mx.153-3.JBB1
    Ios Image Size: 8120832
    Total Image Size: 9298432
    Image Feature: WIRELESS LAN
    Image Family: C1140
    Wireless Switch Management Version: 8.1.111.0
Extracting files...
c1140-k9w7-mx.153-3.JBB1/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1 (119277 bytes).........................
c1140-k9w7-mx.153-3.JBB1/html/ (directory) 0 (bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/ (directory) 0 (bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/1/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/appsui.js (563 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/back.shtml (512 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/cookies.js (5032 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/forms.js (20442 bytes)....
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/sitewide.js (17250 bytes)...
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/config.js (28952 bytes)......
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/stylesheet.css (3220 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/popup_capabilitycodes.shtml.gz (1020 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/filter.js.gz (2037 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/filter_vlan.js.gz (1459 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/filter_mac_ether.js.gz (1793 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/security.js.gz (962 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/vlan.js.gz (1196 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ssid.js.gz (5580 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/dot1x.js.gz (988 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/network-if.js.gz (2098 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/stp.js.gz (957 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_assoc.shtml.gz (5892 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_event-log.shtml.gz (4158 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_home.shtml.gz (7621 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_network-if.shtml.gz (3576 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_network-map.shtml.gz (4124 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_services.shtml.gz (3937 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_system-sw.shtml.gz (3134 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_contextmgr.shtml.gz (4073 bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/ap_title_appname.gif (2042 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/c1040_title_appname.gif (2058 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button.gif (1211 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_1st.gif (1171 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_cbottom.gif (318 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_current.gif (1206 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_endcap.gif (878 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_encap_last.gif (333 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_last.gif (386 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_nth.gif (1177 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_dkgreen.gif (869 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_green.gif (879 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_upright.gif (64 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_yellow.gif (881 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/arrowdown_red.gif (108 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/arrowup_green.gif (108 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/corner_ur_7.gif (53 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/dkgreenmask11_up.gif (113 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/dkgreenmask28_upright.gif (110 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/grn_vertlines_bottom.gif (149 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/grn_vertlines_top.gif (141 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/hinav_plus.gif (56 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/left_bkg.gif (146 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/list_data.gif (122 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/logo.gif (29454 bytes)......
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/pixel.gif (49 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_downleft.gif (53 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_help_off.gif (934 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_help_on.gif (934 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_print_off.gif (111 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_print_on.gif (111 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/spacer.gif (49 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/whitemask11_botleft.gif (62 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/whitemask11_upright.gif (61 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_alert.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_critical.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_debugging.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_emergency.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_error.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_information.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_notification.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_warning.gif (73 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/check_mark.gif (71 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/background_web41.jpg (732 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cisco-logo-2012.gif (579 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/logout_image.gif (40294 bytes)........
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon1.gif (1212 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon2.gif (1185 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon3.gif (1196 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon4.gif (1072 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_download_splash.gif (44862 bytes).........
c1140-k9w7-mx.153-3.JBB1/html/level/15/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_assoc_adv.shtml.gz (4144 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_event-log_config-options.shtml.gz (5730 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_event-log_notif-options.shtml.gz (2693 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_express-setup.shtml.gz (11858 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_express-security.shtml.gz (13550 bytes)...
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_broadcast-ssid.shtml.gz (1263 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_no-security.shtml.gz (1582 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_eap-security.shtml.gz (1791 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wep-security.shtml.gz (1597 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wpa-security.shtml.gz (1854 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ipaddress.shtml.gz (6321 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11.shtml.gz (7132 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_b.shtml.gz (6292 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_c.shtml.gz (29443 bytes)......
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/dBm_mW_translation_table.shtml.gz (1511 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_d.shtml.gz (4070 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ethernet.shtml.gz (4376 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ethernet_b.shtml.gz (6620 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz (3806 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec.shtml.gz (7600 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security.shtml.gz (30281 bytes)......
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-key-security.shtml.gz (12068 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_band_select.shtml.gz (5720 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_auto-config.shtml.gz (3611 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_local-admin-access.shtml.gz (6991 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_network-security_a.shtml.gz (11764 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_network-security_b.shtml.gz (5620 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs.shtml.gz (5087 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs_b.shtml.gz (8525 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs_c.shtml.gz (6205 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz (4984 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz (5061 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz (4668 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz (3608 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ids_mfp.shtml.gz (3922 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (3651 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-security.shtml.gz (6444 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-certificates.shtml.gz (11173 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz (577 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_arp.shtml.gz (3017 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_cdp.shtml.gz (5123 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_console-telnet.shtml.gz (6833 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_dns.shtml.gz (3604 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters.shtml.gz (5313 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-ip.shtml.gz (9264 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-mac.shtml.gz (4011 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-ether.shtml.gz (3855 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_hot-standby.shtml.gz (5506 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_http.shtml.gz (5986 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-b.shtml.gz (6668 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-c.shtml.gz (4163 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-d.shtml.gz (5170 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip.shtml.gz (6015 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos-traffic.shtml.gz (8139 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos.shtml.gz (12217 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos_adv.shtml.gz (4443 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_voice.shtml.gz (4088 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_voice-traffic.shtml.gz (6358 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_snmp.shtml.gz (8027 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_sntp.shtml.gz (5959 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_vlan.shtml.gz (14651 bytes)...
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_stp.shtml.gz (7128 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_stationview-client_ltest.shtml.gz (5535 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade-b.htm (231 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6208 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade.htm (229 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade.shtml.gz (6240 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/banner.html (14136 bytes)...
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameAssociation.html (628 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameEventlog.html (627 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameHome.html (611 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameNetWork.html (619 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameSecurity.html (637 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameServices.html (651 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameSoftware.html (650 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameWireless.html (626 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameset.html (4736 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navAssociation.html (1269 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navBar41.css (3605 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navHome.html (2251 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navNetwork.html (7057 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navSecurity.html (2958 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navServices.html (5018 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navSoftware.html (1542 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navWireless.html (1580 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_down.gif (177 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_down2.gif (838 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_right.gif (137 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_right2.gif (838 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/servicescript41.js.gz (11929 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/sideMenu.js.gz (813 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_easy-setup.shtml.gz (29062 bytes)......
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navEventLog.html (1283 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/content41.css (10497 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/logout.html (2782 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_list.shtml.gz (2556 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_login.shtml.gz (1523 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_new.shtml.gz (4293 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameguest.html (617 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/navguest.html (1605 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_webauth.shtml.gz (3884 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wpa_psk-security.shtml.gz (1859 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/cna_upgrade.htm (5895 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-dot11u.shtml.gz (11397 bytes)..
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade_poll.htm (234 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade_poll.shtml (3596 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_sysconfig.shtml.gz (7443 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_stationview-client.shtml.gz (5592 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_ap.shtml.gz (4784 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm.shtml.gz (5304 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm-groups.shtml.gz (7600 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5205 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1 (7954956 bytes)..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
extracting c1140-k9w7-mx.153-3.JBB1/8001.img (152668 bytes).................................
extracting c1140-k9w7-mx.153-3.JBB1/T2.bin (8080 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/T5.bin (23836 bytes).....
extracting c1140-k9w7-mx.153-3.JBB1/info (283 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/file_hashes (32088 bytes).......
extracting c1140-k9w7-mx.153-3.JBB1/final_hash (141 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/final_hash.sig (513 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/img_sign_rel.cert (1375 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/img_sign_rel_sha2.cert (1371 bytes)
extracting info.ver (283 bytes)
Deleting current version: flash:/c1140-k9w8-mx.124-23c.JA2...done.
New software image installed in flash:/c1140-k9w7-mx.153-3.JBB1
Configuring system to use new image...done.
Requested system reload in progress...download took about 358 seconds
Loading "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1"...############

File "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1" uncompressed and installed, entry point: 0x4000
executing...
enet halted

Secondary Bootloader - Starting system.
FLASH CHIP:  Numonyx P33
Checking for Over Erased blocks
......................................................................................................................................................................................................................................................
Xmodem file system is available.
flashfs[0]: 204 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 11546624
flashfs[0]: Bytes available: 20838400
flashfs[0]: flashfs fsck took 12 seconds.
Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: f8:66:f2:44:5a:e4

Secondary bootloader Ethernet not enabled, skip ether_init
Boot CMD: 'boot  flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1;flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1'
Loading "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1"...##################################
File "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1" uncompressed and installed, entry point: 0x4000
executing...

              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706



Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu 23-Jul-15 10:50 by prod_rel_team

Initializing flashfs...
FLASH CHIP:  Numonyx P33
Checking for Over Erased blocks
......................................................................................................................................................................................................................................................

flashfs[2]: erasing block[38]...
flashfs[2]: erasing block[40]...
flashfs[2]: 204 files, 8 directories
flashfs[2]: 0 orphaned files, 0 orphaned directories
flashfs[2]: Total bytes: 32126976
flashfs[2]: Bytes used: 11546624
flashfs[2]: Bytes available: 20580352
flashfs[2]: flashfs fsck took 12 seconds.
flashfs[2]: Initialization complete.
flashfs[4]: 0 files, 1 directories
flashfs[4]: 0 orphaned files, 0 orphaned directories
flashfs[4]: Total bytes: 11999232
flashfs[4]: Bytes used: 1024
flashfs[4]: Bytes available: 11998208
flashfs[4]: flashfs fsck took 0 seconds.
flashfs[4]: Initialization complete....done Initializing flashfs.

Radio0  present 8363 8000 90020000 0 90030000 B
Rate table has 300 entries (16 legacy/64 11n/220 11ac)

POWER TABLE FILENAME = flash:/c1140-k9w7-mx.153-3.JBB1/T2.bin

Radio1  present 8363 8000 98020000 0 98030000 0
POWER TABLE FILENAME = flash:/c1140-k9w7-mx.153-3.JBB1/T5.bin

Ethernet speed is 1000 Mb - FULL duplex

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision B0) with 98294K/32768K bytes of memory.
Processor board ID FTX1431K7K7
PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from watchdog timer expired
1 Gigabit Ethernet interface
2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: F8:66:F2:44:5A:E4
Part Number                          : 73-11451-08
PCA Assembly Number                  : 800-30554-06
PCA Revision Number                  : A0
PCB Serial Number                    : FOC14302BGX
Top Assembly Part Number             : 800-31273-04
Top Assembly Serial Number           : FTX1431K7K7
Top Revision Number                  : A0
Product/Model Number                 : AIR-LAP1142N-A-K9



Press RETURN to get started!


*Mar  1 00:00:16.061: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed (15)
*Mar  1 00:00:16.062: *** CRASH_LOG = YES

*Mar  1 00:00:18.480: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0 (4)
*Mar  1 00:00:18.656: Loading Power Tables from flash:/c1140-k9w7-mx.153-3.JBB1/T2.bin. Class = A
*Mar  1 00:00:18.657:  record size of 2ss: 404 read_ptr: 215F3F0

*Mar  1 00:00:19.511: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1 (4)
*Mar  1 00:00:19.596: Loading Power Tables from flash:/c1140-k9w7-mx.153-3.JBB1/T5.bin. Class = A
*Mar  1 00:00:19.596:  record size of 2ss: 404 read_ptr: 215F3F0
Base Ethernet MAC address: F8:66:F2:44:5A:E4

*Mar  1 00:00:22.274: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar  1 00:00:23.963: Starting Ethernet promiscuous mode
*Mar  1 00:15:43.003: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar  1 00:15:43.003: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Mar  1 00:15:43.003: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Mar  1 00:15:43.022: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu 23-Jul-15 10
ap>
ap>
ap>
ap>
ap>
ap>
ap>:50 by prod_rel_team
*Mar  1 00:15:43.022: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold start
*Mar  1 00:15:43.051: No configuration in NVRAM..Auto Install initiated..
*Mar  1 00:15:43.983: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Mar  1 00:15:44.003: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Mar  1 00:15:44.003: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Mar  1 00:15:
ap>47.595: %CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source
ap>en
Password:
ap#sh ver
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu 23-Jul-15 10:50 by prod_rel_team

ROM: Bootstrap program is C1140 boot loader
BOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(18a)JA3, RELEASE SOFTWARE (fc1)

ap uptime is 0 minutes
System returned to ROM by watchdog timer expired
System image file is "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1"
Last reload reason:



This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision B0) with 98294K/32768K bytes of memory.
Processor board ID FTX1431K7K7
PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from watchdog timer expired
1 Gigabit Ethernet interface
2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: F8:66:F2:44:5A:E4
Part Number                          : 73-11451-08
PCA Assembly Number                  : 800-30554-06
PCA Revision Number                  : A0
PCB Serial Number                    : FOC14302BGX



Before converting LWAP to Autonomous need to understand the type of OS image running on these platforms. I found following blog post is very useful to summarize the type of IOS & understanding its naming convention.
Following are the three type of IOS available & need to download the correct type before starting the conversion process.
  • k9w7 – autonomous IOS
  • k9w8 – full lightweight IOS (this is what is bundled in the WLC .aes image, and is factory installed on “mesh” APs)
  • rcvk9w8 – lightweight recovery image – this is factory installed on lightweight APs, unless a “mesh” image is specified; it lacks radio firmware
In our case we require k9w7 for Autonomous conversion. More specifically c1140-k9w7-tar.124-25d.JA.tar as my AP is 1142.
To convert Lightweight AP to Autonomous AP, need to have PC directly connected to AP’s ethernet port. If you are powering AP from the switch (i.e use PoE) then PC & AP needs to be in two switch ports in the same vlan. In my example PC is 10.10.10.1/24 & AP is 10.10.10.102/24.
Console into the access point & do the following configurations.
AP5475.d0f5.2ee7#sh ip int brief
Interface                  IP-Address      OK? Method Status                Protocol
Dot11Radio0                unassigned      NO  unset  up                    up      
Dot11Radio1                unassigned      NO  unset  up                    up      
GigabitEthernet0           unassigned      YES DHCP   up                  up  
AP5475.d0f5.2ee7#debug capwap console cli   <- without this line LWAP not accepting the conf t
AP5475.d0f5.2ee7#conf t
AP5475.d0f5.2ee7(config)#ip default-gateway 10.10.10.1
AP5475.d0f5.2ee7(config)#int g0
AP5475.d0f5.2ee7(config-if)#ip address 10.10.10.102 255.255.255.0
AP5475.d0f5.2ee7(config-if)#no sh
AP5475.d0f5.2ee7#ping 10.10.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: !!!!!
AP5475.d0f5.2ee7#archive download-sw /force-reload /overwrite tftp://10.10.10.1/c1140-k9w7-tar.124-25d.JA.tar
"examining image...
 Loading c1140-k9w7-tar.124-25d.JA.tar from 10.10.10.1 (via GigabitEthernet0): !
 extracting info (283 bytes)
 Image info:
     Version Suffix: k9w7-.124-25d.JA ...................."
Once conversion process is over, you can verify the right image is on your access point.
ap>en
  Password:  <-- default password is Cisco
  ap#
  ap#sh version
  Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(25d)JA, RELEASE SOFTWARE (fc1)
  Technical Support: http://www.cisco.com/techsupport
  Copyright (c) 1986-2010 by Cisco Systems, Inc.
  Compiled Thu 09-Dec-10 15:24 by prod_rel_team
ROM: Bootstrap program is C1140 boot loader
  BOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(18a)JA3, RELEASE SOFTWARE (fc1)
ap uptime is 0 minutes
  System returned to ROM by reload
  System image file is "flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA"
For the LWAP conversion, use the recovery image ( e.g  c1140-rcvk9w8-tar.124-25d.JAL.tar). We can use the same command on the autonomous AP priviledge mode.
AP5475.d0f5.2ee7#archive download-sw /force-reload /overwrite tftp://10.10.10.1/c1140-rcvk9w8-tar.124-25d.JA.tar
Following Cisco Support Community forum video demonstrate teh above process.

1 comment: