Cisco AIR-CAP2602I-Z-K9

  1. Start a TFTP server and the console session.

    Download the boot image ap3g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
    Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
    Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
    PC ethernet interface IP settings Tftp settings
  2. Power on the access point.

    Press and hold down the "Mode" button:
    Cisco AIR-CAP2602I-Z-K9
    Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
    IOS Bootloader - Starting system. flash is writable FLASH CHIP: Numonyx Mirrorbit (0089) Xmodem file system is available. flashfs[0]: 95 files, 9 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 31997952 flashfs[0]: Bytes used: 23601664 flashfs[0]: Bytes available: 8396288 flashfs[0]: flashfs fsck took 20 seconds. Reading cookie from SEEPROM Base Ethernet MAC address: 7c:ad:74:40:68:b9 Ethernet speed is 1000 Mb - FULL Duplex button is pressed, wait for button to be released...
    Release the Mode button after 20-30 seconds.
    button pressed for 28 seconds process_config_recovery: set IP address and config to default 10.0.0.1 process_config_recovery: image recovery image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g2-k9w7-tar.default
    It should start extracting files from the autonomous image:
    examining image... DPAA Set for Independent Mode DPAA_INIT = 0x0 extracting info (285 bytes) Image info: Version Suffix: k9w7-.153-3.JF12 Image Name: ap3g2-k9w7-mx.153-3.JF12 Version Directory: ap3g2-k9w7-mx.153-3.JF12 Ios Image Size: 10670592 Total Image Size: 13814272 Image Feature: WIRELESS LAN Image Family: AP3G2 Wireless Switch Management Version: 8.5.161.0 Not enough free space to download image first w/o extracting deleting existing version(s)... Deleting current version: flash:/ap3g2-k9w8-mx.153-3.JF9...done. Extracting files...
  3. Check the autonomous image is running with no configuration

    When the files finish extracting the access point should automatically reboot:
    New software image installed in flash:/ap3g2-k9w7-mx.153-3.JF12 Configuring system to use new image...done. Requested system reload in progress...download took about 807 seconds Rebooting system to reset DPAA...
    Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
    Press RETURN to get started! ap>
    Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
    ap>enable Password: Cisco ap#dir Directory of flash:/ 2 -rwx 56559 Mar 25 2021 13:08:19 +00:00 event.log 3 -rwx 1 Jan 13 2020 15:44:29 +00:00 ce 4 -rwx 280 Apr 21 2021 10:34:26 +00:00 lwapp_officeextend.cfg 5 -rwx 297 Apr 21 2021 10:34:29 +00:00 capwap-saved-config 6 drwx 2496 Jan 1 1970 00:14:05 +00:00 ap3g2-k9w7-mx.153-3.JF12 47 drwx 832 Aug 11 2019 04:32:16 +00:00 configs 48 -rwx 64 Mar 25 2021 13:08:07 +00:00 sensord_CSPRNG0 49 -rwx 64 Mar 25 2021 13:08:07 +00:00 sensord_CSPRNG1 90 -rwx 95008 Apr 21 2021 10:32:35 +00:00 lwapp_reap.cfg.bak 9 -rwx 965 Sep 4 2019 05:21:27 +00:00 lwapp_mm_mwar_hash.cfg 13 drwx 192 Mar 31 2013 13:28:31 +00:00 ap3g2-rcvk9w8-mx 53 -rwx 297 Apr 25 2021 18:19:06 +00:00 capwap-saved-config-bak 67 -rwx 116006 Jul 16 2016 10:04:36 +00:00 event.r1 100 -rwx 118 Apr 21 2021 10:34:28 +00:00 pnp-saved-config 70 -rwx 140656 Mar 26 2019 02:54:04 +00:00 event.r0 79 -rwx 64428 Apr 26 2021 06:47:58 +00:00 lwapp_non_apspecific_reap.cfg 85 -rwx 76564 Apr 21 2021 09:15:54 +00:00 event.capwap 86 -rwx 12312 Apr 25 2021 18:19:06 +00:00 private-multiple-fs 278 -rwx 435 Jan 1 1970 00:14:06 +00:00 env_vars 103 -rwx 95008 Apr 21 2021 10:34:37 +00:00 lwapp_reap.cfg 31739904 bytes total (10083328 bytes free) ap#del lwapp* Delete filename [lwapp*]? Delete flash:/lwapp_officeextend.cfg? [confirm]y Delete flash:/lwapp_reap.cfg.bak? [confirm]y Delete flash:/lwapp_mm_mwar_hash.cfg? [confirm]y Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y Delete flash:/lwapp_reap.cfg? [confirm]y ap#del configs/* Delete filename [configs/*]? Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]y Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/lwapp_lsaclmap.cfg? [confirm]y Delete flash:configs/lwapp_hreap.cfg? [confirm]y Delete flash:configs/lwapp_aclmap.cfg? [confirm]y Delete flash:configs/lwapp_centraldhcpMap.cfg? [confirm]y Delete flash:configs/TLV_FLEX_LOCAL_AUTH_PARAM_PAYLOAD_file? [confirm]y Delete flash:configs/AP_SUBNET_BCAST_DROP_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_FLEX_VLAN_NAME_ID_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_FLEX_AVC_CONFIG_PAYLOAD_file? [confirm]y ap#rmdir configs Remove directory filename [configs]? Delete flash:/configs? [confirm]y Removed dir flash:/configs ap#del *config* Delete filename [*config*]? Delete flash:/config.txt? [confirm]y Delete flash:/capwap-saved-config? [confirm]y Delete flash:/capwap-saved-config-bak? [confirm]y Delete flash:/pnp-saved-config? [confirm]y ap#del ce Delete filename [ce]? Delete flash:/ce? [confirm]y ap#del event.* Delete filename [event.*]? Delete flash:/event.log? [confirm]y Delete flash:/event.r1? [confirm]y Delete flash:/event.r0? [confirm]y Delete flash:/event.capwap? [confirm]y ap#del private* Delete filename [private*]? Delete flash:/private-multiple-fs? [confirm]y ap#del env_vars Delete filename [env_vars]? Delete flash:/env_vars? [confirm]y ap#del sensord* Delete filename [sensord*]? Delete flash:/sensord_CSPRNG0? [confirm]y Delete flash:/sensord_CSPRNG1? [confirm]y ap#show startup-config startup-config is not present ap#show vlans No Virtual LANs configured.
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Turn off/unplug the device and close PuTTy and the TFTP server.