Here is a easy and quick way to convert the AIR-LAP1142N-A-K9 TO AUTONOMOUS AP.
This is a method without configure the IP address of the AP as shown below.
Setting the default IP address and copying to the flash of the AP didn't work for me. I was not able to communicate with the AP on the 10.0.0.1 address. For example:
ap: set IP_ADDR 10.0.0.1
ap: set NETMASK 255.0.0.0
ap: set DEFAULT_ROUTER 10.0.0.2
ap: tftp_init
ap: ether_init
ap: flash_init
ap: tar -xtract tftp://10.0.0.2/c1140-k9w7-tar.124-25d.JA.tar flash:
ap: set BOOT flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA
ap: boot
Here are the steps to follow:
1. Install Klever TfTP on your computer
2. Download the standalone Autonomous version of the image software.
3. Configure the TFTP server on the computer; Copy the image software from (Step 2) to the tftp directory and rename it "c1140-k9w7-tar.default" or the name of the image it tries to default to. When the AP boots it will load extract the image and delete the existing image. (see below screen capture)
This is a method without configure the IP address of the AP as shown below.
Setting the default IP address and copying to the flash of the AP didn't work for me. I was not able to communicate with the AP on the 10.0.0.1 address. For example:
ap: set IP_ADDR 10.0.0.1
ap: set NETMASK 255.0.0.0
ap: set DEFAULT_ROUTER 10.0.0.2
ap: tftp_init
ap: ether_init
ap: flash_init
ap: tar -xtract tftp://10.0.0.2/c1140-k9w7-tar.124-25d.JA.tar flash:
ap: set BOOT flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA
ap: boot
Here are the steps to follow:
1. Install Klever TfTP on your computer
2. Download the standalone Autonomous version of the image software.
3. Configure the TFTP server on the computer; Copy the image software from (Step 2) to the tftp directory and rename it "c1140-k9w7-tar.default" or the name of the image it tries to default to. When the AP boots it will load extract the image and delete the existing image. (see below screen capture)
4. Configure your laptop’s Ethernet connection to use static IP 10.0.0.2 with netmask 255.0.0.0, NO Default Gateway/Router; The idea is to place the both the AP and the computer on the same LAN without blocking any network traffic .
5. Connect your computer Ethernet cable to the switch and connect the other cable from your AP (Ethernet port) to the switch. Power on the switch;
6. Connect your AP’s Ethernet port to the switch;
6. Connect your AP’s Ethernet port to the switch;
— With the above a few steps your TFTP server is ready to serve the image software
Next:
7. Connect your Cisco serial console cable to your System. Connect the Cisco serial console cable to the Console port of the AP;
8. Open your Terminal program such as Tera Term and configure the serial communication port
9. Hold down your “Mode” button of the AP while plugging in the power of the AP;
10. You can see now see the Terminal is displaying the AP startup messages. Keep holding the Mode button until you see the AP showing the red light, then release the Mode button. You will see the message "button is pressed, wait for button to be released...button pressed for 27 seconds"
11. On the Terminal window, you will see it’s trying to load the software recovery image from the TFTP server at 255.255.255.255
7. Connect your Cisco serial console cable to your System. Connect the Cisco serial console cable to the Console port of the AP;
8. Open your Terminal program such as Tera Term and configure the serial communication port
9. Hold down your “Mode” button of the AP while plugging in the power of the AP;
10. You can see now see the Terminal is displaying the AP startup messages. Keep holding the Mode button until you see the AP showing the red light, then release the Mode button. You will see the message "button is pressed, wait for button to be released...button pressed for 27 seconds"
11. On the Terminal window, you will see it’s trying to load the software recovery image from the TFTP server at 255.255.255.255
Screen capture Output:
using eeprom values
WRDTR,CLKTR:
0x86000800 0x40000000
RQDC ,RFDC :
0x8000003b 0x00000212
ddr init
done
IOS
Bootloader - Starting system.
Xmodem file
system is available.
DDR values
used from system serial eeprom.
WRDTR,CLKTR:
0x86000800, 0x40000000
RQDC, RFDC :
0x8000003b, 0x00000212
PCIE0: link
is up.
PCIE0: VC0
is active
PCIE1: link
is up.
PCIE1: VC0
is active
PCIEx:
initialization done
flashfs[0]:
28 files, 8 directories
flashfs[0]:
0 orphaned files, 0 orphaned directories
flashfs[0]:
Total bytes: 32385024
flashfs[0]:
Bytes used: 7382016
flashfs[0]:
Bytes available: 25003008
flashfs[0]:
flashfs fsck took 20 seconds.
Reading
cookie from system serial eeprom...Done
Base
Ethernet MAC address: f8:66:f2:44:5a:e4
Ethernet
speed is 1000 Mb - FULL duplex
button is
pressed, wait for button to be released...
button
pressed for 27 seconds
process_config_recovery:
set IP address and config to default 10.0.0.1
process_config_recovery:
image recovery
image_recovery:
Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default
examining
image...
extracting
info (283 bytes)
Image info:
Version Suffix: k9w7-.153-3.JBB1
Image Name: c1140-k9w7-mx.153-3.JBB1
Version Directory: c1140-k9w7-mx.153-3.JBB1
Ios Image Size: 8120832
Total Image Size: 9298432
Image Feature: WIRELESS LAN
Image Family: C1140
Wireless Switch Management Version:
8.1.111.0
Extracting
files...
c1140-k9w7-mx.153-3.JBB1/
(directory) 0 (bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1 (119277
bytes).........................
c1140-k9w7-mx.153-3.JBB1/html/
(directory) 0 (bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/
(directory) 0 (bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/1/
(directory) 0 (bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/appsui.js (563 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/back.shtml (512 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/cookies.js (5032 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/forms.js (20442 bytes)....
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/sitewide.js (17250 bytes)...
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/config.js (28952 bytes)......
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/stylesheet.css (3220 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/popup_capabilitycodes.shtml.gz (1020
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/filter.js.gz (2037 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/filter_vlan.js.gz (1459 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/filter_mac_ether.js.gz (1793 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/security.js.gz (962 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/vlan.js.gz (1196 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ssid.js.gz (5580 bytes).
extracting c1140-k9w7-mx.153-3.JBB1/html/level/1/dot1x.js.gz
(988 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/network-if.js.gz (2098 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/stp.js.gz (957 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_assoc.shtml.gz (5892 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_event-log.shtml.gz (4158 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_home.shtml.gz (7621 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_network-if.shtml.gz (3576 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_network-map.shtml.gz (4124 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_services.shtml.gz (3937 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_system-sw.shtml.gz (3134 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/ap_contextmgr.shtml.gz (4073 bytes)
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/
(directory) 0 (bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/ap_title_appname.gif (2042 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/c1040_title_appname.gif (2058
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button.gif (1211 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_1st.gif (1171 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_cbottom.gif (318
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_current.gif (1206
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_endcap.gif (878 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_encap_last.gif (333
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_last.gif (386 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_button_nth.gif (1177 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_dkgreen.gif (869
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_green.gif (879 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_upright.gif (64
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/apps_leftnav_yellow.gif (881
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/arrowdown_red.gif (108 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/arrowup_green.gif (108 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/corner_ur_7.gif (53 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/dkgreenmask11_up.gif (113 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/dkgreenmask28_upright.gif (110
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/grn_vertlines_bottom.gif (149
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/grn_vertlines_top.gif (141 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/hinav_plus.gif (56 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/left_bkg.gif (146 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/list_data.gif (122 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/logo.gif (29454 bytes)......
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/pixel.gif (49 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_downleft.gif (53 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_help_off.gif (934 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_help_on.gif (934 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_print_off.gif (111 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/sitewide_print_on.gif (111 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/spacer.gif (49 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/whitemask11_botleft.gif (62 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/whitemask11_upright.gif (61 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_alert.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_critical.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_debugging.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_emergency.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_error.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_information.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_notification.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/event_warning.gif (73 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/check_mark.gif (71 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/background_web41.jpg (732 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cisco-logo-2012.gif (579 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/logout_image.gif (40294
bytes)........
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon1.gif (1212 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon2.gif (1185 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon3.gif (1196 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_icon4.gif (1072 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/1/images/cna_download_splash.gif (44862
bytes).........
c1140-k9w7-mx.153-3.JBB1/html/level/15/
(directory) 0 (bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_assoc_adv.shtml.gz (4144 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_event-log_config-options.shtml.gz
(5730 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_event-log_notif-options.shtml.gz
(2693 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_express-setup.shtml.gz (11858
bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_express-security.shtml.gz (13550
bytes)...
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_broadcast-ssid.shtml.gz (1263 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_no-security.shtml.gz (1582 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_eap-security.shtml.gz (1791 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wep-security.shtml.gz (1597 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wpa-security.shtml.gz (1854 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ipaddress.shtml.gz (6321
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11.shtml.gz (7132
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_b.shtml.gz (6292
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_c.shtml.gz (29443
bytes)......
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/dBm_mW_translation_table.shtml.gz (1511
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_802-11_d.shtml.gz (4070
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ethernet.shtml.gz (4376
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-if_ethernet_b.shtml.gz (6620
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz
(3806 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec.shtml.gz (7600 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security.shtml.gz
(30281 bytes)......
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-key-security.shtml.gz (12068
bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_band_select.shtml.gz (5720
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_auto-config.shtml.gz (3611
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_local-admin-access.shtml.gz (6991
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_network-security_a.shtml.gz
(11764 bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_network-security_b.shtml.gz (5620
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs.shtml.gz (5087 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs_b.shtml.gz (8525 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_lrs_c.shtml.gz (6205 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz
(4984 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz
(5061 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz
(4668 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz
(3608 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ids_mfp.shtml.gz (3922 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (3651
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-security.shtml.gz (6444
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-certificates.shtml.gz
(11173 bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz
(577 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_arp.shtml.gz (3017 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_cdp.shtml.gz (5123 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_console-telnet.shtml.gz
(6833 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_dns.shtml.gz (3604 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters.shtml.gz (5313
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-ip.shtml.gz (9264
bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-mac.shtml.gz (4011
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_filters-ether.shtml.gz (3855
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_hot-standby.shtml.gz (5506
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_http.shtml.gz (5986 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-b.shtml.gz (6668
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-c.shtml.gz (4163
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip-d.shtml.gz (5170
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_mobile-ip.shtml.gz (6015
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos-traffic.shtml.gz (8139
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos.shtml.gz (12217 bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_qos_adv.shtml.gz (4443
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_voice.shtml.gz (4088 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_voice-traffic.shtml.gz (6358
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_snmp.shtml.gz (8027 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_sntp.shtml.gz (5959 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_vlan.shtml.gz (14651
bytes)...
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_services_stp.shtml.gz (7128 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_stationview-client_ltest.shtml.gz
(5535 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade-b.htm (231 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6208
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade.htm (229 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade.shtml.gz (6240
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/banner.html (14136 bytes)...
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameAssociation.html (628 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameEventlog.html (627 bytes)
extracting c1140-k9w7-mx.153-3.JBB1/html/level/15/frameHome.html
(611 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameNetWork.html (619 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameSecurity.html (637 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameServices.html (651 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameSoftware.html (650 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameWireless.html (626 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameset.html (4736 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navAssociation.html (1269 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navBar41.css (3605 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navHome.html (2251 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navNetwork.html (7057 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navSecurity.html (2958 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navServices.html (5018 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navSoftware.html (1542 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navWireless.html (1580 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_down.gif (177 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_down2.gif (838 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_right.gif (137 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/arrow_right2.gif (838 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/servicescript41.js.gz (11929 bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/sideMenu.js.gz (813 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_easy-setup.shtml.gz (29062
bytes)......
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navEventLog.html (1283 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/content41.css (10497 bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/logout.html (2782 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_list.shtml.gz (2556 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_login.shtml.gz (1523 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_guest_new.shtml.gz (4293 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/frameguest.html (617 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/navguest.html (1605 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_webauth.shtml.gz (3884 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/def_wpa_psk-security.shtml.gz (1859
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/cna_upgrade.htm (5895 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_sec_ap-client-dot11u.shtml.gz (11397
bytes)..
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade_poll.htm (234
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_upgrade_poll.shtml (3596
bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_system-sw_sysconfig.shtml.gz (7443
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_stationview-client.shtml.gz (5592
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_ap.shtml.gz (4784 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm.shtml.gz (5304 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm-groups.shtml.gz (7600
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5205
bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1 (7954956
bytes)..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
extracting
c1140-k9w7-mx.153-3.JBB1/8001.img (152668
bytes).................................
extracting
c1140-k9w7-mx.153-3.JBB1/T2.bin (8080 bytes).
extracting
c1140-k9w7-mx.153-3.JBB1/T5.bin (23836 bytes).....
extracting
c1140-k9w7-mx.153-3.JBB1/info (283 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/file_hashes (32088 bytes).......
extracting
c1140-k9w7-mx.153-3.JBB1/final_hash (141 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/final_hash.sig (513 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/img_sign_rel.cert (1375 bytes)
extracting
c1140-k9w7-mx.153-3.JBB1/img_sign_rel_sha2.cert (1371 bytes)
extracting
info.ver (283 bytes)
Deleting
current version: flash:/c1140-k9w8-mx.124-23c.JA2...done.
New software
image installed in flash:/c1140-k9w7-mx.153-3.JBB1
Configuring
system to use new image...done.
Requested
system reload in progress...download took about 358 seconds
Loading
"flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1"...############
File
"flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-mx.153-3.JBB1"
uncompressed and installed, entry point: 0x4000
executing...
enet halted
Secondary
Bootloader - Starting system.
FLASH
CHIP: Numonyx P33
Checking for
Over Erased blocks
......................................................................................................................................................................................................................................................
Xmodem file
system is available.
flashfs[0]:
204 files, 8 directories
flashfs[0]:
0 orphaned files, 0 orphaned directories
flashfs[0]:
Total bytes: 32385024
flashfs[0]:
Bytes used: 11546624
flashfs[0]:
Bytes available: 20838400
flashfs[0]:
flashfs fsck took 12 seconds.
Reading
cookie from system serial eeprom...Done
Base
Ethernet MAC address: f8:66:f2:44:5a:e4
Secondary
bootloader Ethernet not enabled, skip ether_init
Boot CMD:
'boot
flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1;flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1'
Loading
"flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1"...##################################
File
"flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1"
uncompressed and installed, entry point: 0x4000
executing...
Restricted Rights Legend
Use,
duplication, or disclosure by the Government is
subject to
restrictions as set forth in subparagraph
(c) of the
Commercial Computer Software - Restricted
Rights
clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii)
of the Rights in Technical Data and Computer
Software
clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS
Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE
(fc2)
Technical
Support: http://www.cisco.com/techsupport
Copyright
(c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu
23-Jul-15 10:50 by prod_rel_team
Initializing
flashfs...
FLASH
CHIP: Numonyx P33
Checking for
Over Erased blocks
......................................................................................................................................................................................................................................................
flashfs[2]:
erasing block[38]...
flashfs[2]:
erasing block[40]...
flashfs[2]:
204 files, 8 directories
flashfs[2]:
0 orphaned files, 0 orphaned directories
flashfs[2]:
Total bytes: 32126976
flashfs[2]:
Bytes used: 11546624
flashfs[2]:
Bytes available: 20580352
flashfs[2]:
flashfs fsck took 12 seconds.
flashfs[2]:
Initialization complete.
flashfs[4]:
0 files, 1 directories
flashfs[4]:
0 orphaned files, 0 orphaned directories
flashfs[4]:
Total bytes: 11999232
flashfs[4]:
Bytes used: 1024
flashfs[4]:
Bytes available: 11998208
flashfs[4]:
flashfs fsck took 0 seconds.
flashfs[4]:
Initialization complete....done Initializing flashfs.
Radio0 present 8363 8000 90020000 0 90030000 B
Rate table
has 300 entries (16 legacy/64 11n/220 11ac)
POWER TABLE
FILENAME = flash:/c1140-k9w7-mx.153-3.JBB1/T2.bin
Radio1 present 8363 8000 98020000 0 98030000 0
POWER TABLE
FILENAME = flash:/c1140-k9w7-mx.153-3.JBB1/T5.bin
Ethernet
speed is 1000 Mb - FULL duplex
This product
contains cryptographic features and is subject to United
States and
local country laws governing import, export, transfer and
use.
Delivery of Cisco cryptographic products does not imply
third-party
authority to import, export, distribute or use encryption.
Importers,
exporters, distributors and users are responsible for
compliance
with U.S. and local country laws. By using this product you
agree to
comply with applicable laws and regulations. If you are unable
to comply
with U.S. and local laws, return this product immediately.
A summary of
U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you
require further assistance please contact us by sending email to
export@cisco.com.
cisco
AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision B0) with 98294K/32768K
bytes of memory.
Processor
board ID FTX1431K7K7
PowerPC405ex
CPU at 586Mhz, revision number 0x147E
Last reset
from watchdog timer expired
1 Gigabit
Ethernet interface
2 802.11
Radios
32K bytes of
flash-simulated non-volatile configuration memory.
Base
ethernet MAC Address: F8:66:F2:44:5A:E4
Part
Number :
73-11451-08
PCA Assembly
Number : 800-30554-06
PCA Revision
Number : A0
PCB Serial
Number : FOC14302BGX
Top Assembly
Part Number : 800-31273-04
Top Assembly
Serial Number : FTX1431K7K7
Top Revision
Number : A0
Product/Model
Number :
AIR-LAP1142N-A-K9
Press RETURN
to get started!
*Mar 1 00:00:16.061:
%SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed (15)
*Mar 1 00:00:16.062: *** CRASH_LOG = YES
*Mar 1 00:00:18.480:
%SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on
interface Dot11Radio 0 (4)
*Mar 1 00:00:18.656: Loading Power Tables from
flash:/c1140-k9w7-mx.153-3.JBB1/T2.bin. Class = A
*Mar 1 00:00:18.657: record size of 2ss: 404 read_ptr: 215F3F0
*Mar 1 00:00:19.511:
%SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on
interface Dot11Radio 1 (4)
*Mar 1 00:00:19.596: Loading Power Tables from
flash:/c1140-k9w7-mx.153-3.JBB1/T5.bin. Class = A
*Mar 1 00:00:19.596: record size of 2ss: 404 read_ptr: 215F3F0
Base
Ethernet MAC address: F8:66:F2:44:5A:E4
*Mar 1 00:00:22.274: %LINK-6-UPDOWN: Interface
GigabitEthernet0, changed state to up
*Mar 1 00:00:23.963: Starting Ethernet promiscuous
mode
*Mar 1 00:15:43.003: %LINEPROTO-5-UPDOWN: Line
protocol on Interface GigabitEthernet0, changed state to up
*Mar 1 00:15:43.003: %LINK-5-CHANGED: Interface
Dot11Radio0, changed state to administratively down
*Mar 1 00:15:43.003: %LINK-5-CHANGED: Interface
Dot11Radio1, changed state to administratively down
*Mar 1 00:15:43.022: %SYS-5-RESTART: System
restarted --
Cisco IOS
Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE
(fc2)
Technical
Support: http://www.cisco.com/techsupport
Copyright
(c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu
23-Jul-15 10
ap>
ap>
ap>
ap>
ap>
ap>
ap>:50 by
prod_rel_team
*Mar 1 00:15:43.022: %SNMP-5-COLDSTART: SNMP agent
on host ap is undergoing a cold start
*Mar 1 00:15:43.051: No configuration in
NVRAM..Auto Install initiated..
*Mar 1 00:15:43.983: %LINEPROTO-5-UPDOWN: Line
protocol on Interface BVI1, changed state to up
*Mar 1 00:15:44.003: %LINEPROTO-5-UPDOWN: Line
protocol on Interface Dot11Radio0, changed state to down
*Mar 1 00:15:44.003: %LINEPROTO-5-UPDOWN: Line
protocol on Interface Dot11Radio1, changed state to down
*Mar 1 00:15:
ap>47.595:
%CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source
ap>en
Password:
ap#sh ver
Cisco IOS
Software, C1140 Software (C1140-K9W7-M), Version 15.3(3)JBB1, RELEASE SOFTWARE
(fc2)
Technical
Support: http://www.cisco.com/techsupport
Copyright
(c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu
23-Jul-15 10:50 by prod_rel_team
ROM:
Bootstrap program is C1140 boot loader
BOOTLDR:
C1140 Boot Loader (C1140-BOOT-M) Version 12.4(18a)JA3, RELEASE SOFTWARE (fc1)
ap uptime is
0 minutes
System
returned to ROM by watchdog timer expired
System image
file is "flash:/c1140-k9w7-mx.153-3.JBB1/c1140-k9w7-xx.153-3.JBB1"
Last reload
reason:
This product
contains cryptographic features and is subject to United
States and
local country laws governing import, export, transfer and
use.
Delivery of Cisco cryptographic products does not imply
third-party
authority to import, export, distribute or use encryption.
Importers,
exporters, distributors and users are responsible for
compliance
with U.S. and local country laws. By using this product you
agree to
comply with applicable laws and regulations. If you are unable
to comply
with U.S. and local laws, return this product immediately.
A summary of
U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you
require further assistance please contact us by sending email to
export@cisco.com.
cisco
AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision B0) with 98294K/32768K
bytes of memory.
Processor
board ID FTX1431K7K7
PowerPC405ex
CPU at 586Mhz, revision number 0x147E
Last reset
from watchdog timer expired
1 Gigabit
Ethernet interface
2 802.11
Radios
32K bytes of
flash-simulated non-volatile configuration memory.
Base
ethernet MAC Address: F8:66:F2:44:5A:E4
Part
Number :
73-11451-08
PCA Assembly
Number : 800-30554-06
PCA Revision
Number : A0
PCB Serial
Number : FOC14302BGX
Before converting LWAP to Autonomous need to understand the type of OS image running on these platforms. I found following blog post is very useful to summarize the type of IOS & understanding its naming convention.
Following are the three type of IOS available & need to download the correct type before starting the conversion process.
- k9w7 – autonomous IOS
- k9w8 – full lightweight IOS (this is what is bundled in the WLC .aes image, and is factory installed on “mesh” APs)
- rcvk9w8 – lightweight recovery image – this is factory installed on lightweight APs, unless a “mesh” image is specified; it lacks radio firmware
In our case we require k9w7 for Autonomous conversion. More specifically c1140-k9w7-tar.124-25d.JA.tar as my AP is 1142.
To convert Lightweight AP to Autonomous AP, need to have PC directly connected to AP’s ethernet port. If you are powering AP from the switch (i.e use PoE) then PC & AP needs to be in two switch ports in the same vlan. In my example PC is 10.10.10.1/24 & AP is 10.10.10.102/24.
Console into the access point & do the following configurations.
AP5475.d0f5.2ee7#sh ip int brief
Interface IP-Address OK? Method Status Protocol
Dot11Radio0 unassigned NO unset up up
Dot11Radio1 unassigned NO unset up up
GigabitEthernet0 unassigned YES DHCP up up
Interface IP-Address OK? Method Status Protocol
Dot11Radio0 unassigned NO unset up up
Dot11Radio1 unassigned NO unset up up
GigabitEthernet0 unassigned YES DHCP up up
AP5475.d0f5.2ee7#debug capwap console cli <- without this line LWAP not accepting the conf t
AP5475.d0f5.2ee7#conf t
AP5475.d0f5.2ee7(config)#ip default-gateway 10.10.10.1
AP5475.d0f5.2ee7(config)#int g0
AP5475.d0f5.2ee7(config-if)#ip address 10.10.10.102 255.255.255.0
AP5475.d0f5.2ee7(config-if)#no sh
AP5475.d0f5.2ee7(config)#ip default-gateway 10.10.10.1
AP5475.d0f5.2ee7(config)#int g0
AP5475.d0f5.2ee7(config-if)#ip address 10.10.10.102 255.255.255.0
AP5475.d0f5.2ee7(config-if)#no sh
AP5475.d0f5.2ee7#ping 10.10.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: !!!!!
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds: !!!!!
AP5475.d0f5.2ee7#archive download-sw /force-reload /overwrite tftp://10.10.10.1/c1140-k9w7-tar.124-25d.JA.tar
"examining image...
Loading c1140-k9w7-tar.124-25d.JA.tar from 10.10.10.1 (via GigabitEthernet0): !
extracting info (283 bytes)
Image info:
Version Suffix: k9w7-.124-25d.JA ...................."
Once conversion process is over, you can verify the right image is on your access point.
ap>en
Password: <-- default password is Cisco
ap#
ap#sh version
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(25d)JA, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Thu 09-Dec-10 15:24 by prod_rel_team
ROM: Bootstrap program is C1140 boot loader
BOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(18a)JA3, RELEASE SOFTWARE (fc1)
ap uptime is 0 minutes
System returned to ROM by reload
System image file is "flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA"
For the LWAP conversion, use the recovery image ( e.g c1140-rcvk9w8-tar.124-25d.JAL.tar). We can use the same command on the autonomous AP priviledge mode.
AP5475.d0f5.2ee7#archive download-sw /force-reload /overwrite tftp://10.10.10.1/c1140-rcvk9w8-tar.124-25d.JA.tar
Following Cisco Support Community forum video demonstrate teh above process.
grt
ReplyDelete