Cisco AIR-CAP1602I-Z-K9

  1. Start a TFTP server and the console session.

    Download the boot image ap1g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
    Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
    Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
    PC ethernet interface IP settings Tftp settings
  2. Power on the access point.

    Press and hold down the "Mode" button:
    Cisco AIR-CAP1602I-Z-K9
    Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
    IOS Bootloader - Starting system. FLASH CHIP: Spansion S25FL256 Xmodem file system is available. flashfs[0]: 68 files, 9 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 31936000 flashfs[0]: Bytes used: 21336064 flashfs[0]: Bytes available: 10599936 flashfs[0]: flashfs fsck took 10 seconds. Reading cookie from SEEPROM Base Ethernet MAC address: 64:f6:9d:5e:8f:67 ************* loopback_mode = 0 button is pressed, wait for button to be released...
    Release the Mode button after 20-30 seconds.
    button pressed for 20 seconds process_config_recovery: set IP address and config to default 10.0.0.1 process_config_recovery: image recovery image_recovery: Download default IOS tar image tftp://255.255.255.255/ap1g2-k9w7- tar.default
    It should start extracting files from the autonomous image:
    examining image... extracting info (288 bytes) Image info: Version Suffix: k9w7-.153-3.JF12i Image Name: ap1g2-k9w7-mx.153-3.JF12i Version Directory: ap1g2-k9w7-mx.153-3.JF12i Ios Image Size: 10496512 Total Image Size: 11971072 Image Feature: WIRELESS LAN Image Family: AP1G2 Wireless Switch Management Version: 8.5.164.0 Not enough free space to download image first w/o extracting deleting existing version(s)... Deleting current version: flash:/ap1g2-rcvk9w8-mx...done. Extracting files...
  3. Check the autonomous image is running with no configuration

    When the files finish extracting the access point should automatically reboot:
    New software image installed in flash:/ap1g2-k9w7-mx.153-3.JF12i Configuring system to use new image...done. Requested system reload in progress...download took about 279 seconds
    Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
    Press RETURN to get started! ap>
    Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
    ap>enable Password: Cisco ap#dir Directory of flash:/ 2 -rwx 60245 Jan 13 2020 22:54:39 +00:00 event.log 3 -rwx 296 Mar 1 1993 00:01:18 +00:00 capwap-saved-config 17 drwx 896 Jan 1 1970 00:04:56 +00:00 ap1g2-k9w7-mx.153-3.JF12i 4 -rwx 280 Jan 14 2020 08:12:39 +00:00 lwapp_officeextend.cfg 5 -rwx 965 Oct 20 2015 11:19:12 +00:00 lwapp_mm_mwar_hash.cfg 6 drwx 896 Jan 13 2020 07:19:51 +00:00 ap1g2-k9w8-mx.153-3.JF9 49 drwx 768 Mar 1 1993 00:00:37 +00:00 configs 58 -rwx 141102 Oct 18 2017 03:06:05 +00:00 event.r0 51 -rwx 46024 Jan 14 2020 21:30:32 +00:00 lwapp_non_apspecific_reap.cfg 59 -rwx 62794 Jan 14 2020 14:03:17 +00:00 event.capwap 72 -rwx 12312 Jan 14 2020 21:31:01 +00:00 private-multiple-fs 66 -rwx 64 Jan 13 2020 22:54:33 +00:00 sensord_CSPRNG1 62 -rwx 141296 Mar 15 2019 23:07:45 +00:00 event.r1 65 -rwx 297 Jan 14 2020 08:57:39 +00:00 capwap-saved-config-bak 67 -rwx 106 Mar 1 1993 00:01:18 +00:00 pnp-saved-config 283 -rwx 315 Jan 1 1970 00:04:57 +00:00 env_vars 70 -rwx 95008 Jan 14 2020 08:13:05 +00:00 lwapp_reap.cfg.bak 78 -rwx 95008 Jan 14 2020 21:30:31 +00:00 lwapp_reap.cfg 31936000 bytes total (5414912 bytes free) ap#del event.* Delete filename [event.*]? Delete flash:/event.log? [confirm]y Delete flash:/event.r0? [confirm]y Delete flash:/event.capwap? [confirm]y Delete flash:/event.r1? [confirm]y ap#del lwapp* Delete filename [lwapp*]? Delete flash:/lwapp_officeextend.cfg? [confirm]y Delete flash:/lwapp_mm_mwar_hash.cfg? [confirm]y Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y Delete flash:/lwapp_reap.cfg.bak? [confirm]y Delete flash:/lwapp_reap.cfg? [confirm]y ap#del *config* Delete filename [*config*]? Delete flash:/capwap-saved-config? [confirm]y Delete flash:/configs? [confirm]y %Error deleting flash:/configs (Is a directory) Delete flash:/capwap-saved-config-bak? [confirm]y Delete flash:/pnp-saved-config? [confirm]y ap#del configs/* Delete filename [configs/*]? Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]y Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y Delete flash:configs/AP_SUBNET_BCAST_DROP_PAYLOAD_file? [confirm]y Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_FLEX_NATIVE_VLAN_LVL_PAYLOAD_file? [confirm]y Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/lwapp_aclmap.cfg? [confirm]y Delete flash:configs/TLV_FLEX_LOCAL_AUTH_PARAM_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_FLEX_VLAN_NAME_ID_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/lwapp_centraldhcpMap.cfg? [confirm]y Delete flash:configs/lwapp_lsaclmap.cfg? [confirm]y ap#rmdir configs Remove directory filename [configs]? Delete flash:/configs? [confirm]y Removed dir flash:/configs ap#del env* Delete filename [env*]? Delete flash:/env_vars? [confirm]y ap#del private* Delete filename [private*]? Delete flash:/private-multiple-fs? [confirm]y ap#del sensord* Delete filename [sensord*]? Delete flash:/sensord_CSPRNG1? [confirm]y ap#show startup-config startup-config is not present ap#show vlans No Virtual LANs configured.
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Turn off/unplug the device and close PuTTy and the TFTP server.