Cisco AIR-CAP3502I-N-K9

  1. Start a TFTP server and the console session.

    Download the boot image ap3g1-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
    Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
    Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
    PC ethernet interface IP settings Tftp settings
  2. Power on the access point.

    Press and hold down the "Mode" button:
    Cisco AIR-CAP3502I-N-K9
    Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
    IOS Bootloader - Starting system. FLASH CHIP: Numonyx P33 Checking for Over Erased blocks ................................................................................. ................................................................................. ................................................................................. ... Xmodem file system is available. DDR values used from system serial eeprom. WRDTR,CLKTR: 0x8200083f, 0x40000000 RQDC, RFDC : 0x80000032, 0x00000215 PCIE0: link is up. PCIE0: VC0 is active PCIE1: link is up. PCIE1: VC0 is active 64bit PCIE devices PCIEx: initialization done flashfs[0]: 58 files, 9 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 31739904 flashfs[0]: Bytes used: 12829696 flashfs[0]: Bytes available: 18910208 flashfs[0]: flashfs fsck took 10 seconds. Reading cookie from system serial eeprom...Done Base Ethernet MAC address: 00:07:7d:b6:20:af Ethernet speed is 1000 Mb - FULL duplex button is pressed, wait for button to be released...
    Release the Mode button after 20-30 seconds.
    button pressed for 21 seconds process_config_recovery: set IP address and config to default 10.0.0.1 process_config_recovery: image recovery image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g1-k9w7- tar.default
    It should start extracting files from the autonomous image:
    examining image... extracting info (286 bytes) Image info: Version Suffix: k9w7-.153-3.JF11 Image Name: ap3g1-k9w7-mx.153-3.JF11 Version Directory: ap3g1-k9w7-mx.153-3.JF11 Ios Image Size: 8735232 Total Image Size: 10732032 Image Feature: WIRELESS LAN Image Family: AP3G1 Wireless Switch Management Version: 8.5.160.0 Extracting files...
  3. Check the autonomous image is running with no configuration

    When the files finish extracting the access point should automatically reboot:
    Deleting current version: flash:/ap3g1-rcvk9w8-mx...done. New software image installed in flash:/ap3g1-k9w7-mx.153-3.JF11 Configuring system to use new image...done. Requested system reload in progress...download took about 651 seconds
    Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
    Press RETURN to get started! ap>
    Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
    ap>enable Password: Cisco ap#dir Directory of flash:/ 2 -rwx 265 May 10 2017 22:08:37 +00:00 lwapp_mobileconcierge.cfg 3 -rwx 130284 May 22 2019 22:32:57 +00:00 event.log 9 -rwx 128982 Sep 4 2019 03:02:45 +00:00 event.r0 40 -rwx 280 Sep 17 2019 19:40:45 +00:00 lwapp_officeextend.cfg 41 -rwx 64 May 15 2018 11:24:10 +00:00 sensord_CSPRNG1 42 -rwx 64 May 15 2018 11:24:10 +00:00 sensord_CSPRNG0 5 -rwx 36032 Sep 25 2019 02:27:50 +00:00 lwapp_non_apspecific_reap.cfg 6 -rwx 59801 Sep 16 2019 14:47:45 +00:00 event.capwap 53 drwx 1152 Jan 1 1970 00:11:06 +00:00 ap3g1-k9w7-mx.153-3.JF11 7 drwx 320 Jul 16 2016 10:37:13 +00:00 configs 16 drwx 1152 May 15 2018 11:23:55 +00:00 ap3g1-k9w8- mx.v153_80mr.201605200400 8 -rwx 133241 Nov 26 2018 04:53:54 +00:00 event.r1 60 -rwx 75 Sep 17 2019 19:40:44 +00:00 capwap-saved-config 10 -rwx 12312 Sep 25 2019 02:44:15 +00:00 private-multiple-fs 61 -rwx 75 Sep 25 2019 02:44:15 +00:00 capwap-saved-config-bak 11 -rwx 298 Jan 1 1970 00:11:12 +00:00 env_vars 66 -rwx 965 May 30 2019 13:59:03 +00:00 lwapp_mm_mwar_hash.cfg 15 -rwx 95008 Sep 17 2019 19:41:23 +00:00 lwapp_reap.cfg 69 -rwx 95008 Sep 17 2019 19:40:49 +00:00 lwapp_reap.cfg.bak 31481856 bytes total (10288640 bytes free) ap#del lwapp* Delete filename [lwapp*]? Delete flash:/lwapp_mobileconcierge.cfg? [confirm]y Delete flash:/lwapp_officeextend.cfg? [confirm]y Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y Delete flash:/lwapp_mm_mwar_hash.cfg? [confirm]y Delete flash:/lwapp_reap.cfg? [confirm]y Delete flash:/lwapp_reap.cfg.bak? [confirmy ap#del configs/* Delete filename [configs/*]? Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]y Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y ap#rmdir configs Remove directory filename [configs]? Delete flash:/configs? [confirm]y Removed dir flash:/configs ap#del *config* Delete filename [*config*]? Delete flash:/capwap-saved-config? [confirm]y Delete flash:/capwap-saved-config-bak? [confirm]y ap#del event.* Delete filename [event.*]? Delete flash:/event.log? [confirm]y Delete flash:/event.r0? [confirm]y Delete flash:/event.capwap? [confirm]y Delete flash:/event.r1? [confirm]y ap#del private* Delete filename [private*]? Delete flash:/private-multiple-fs? [confirm]y ap#del env_vars Delete filename [env_vars]? Delete flash:/env_vars? [confirm]y ap#del sensord* Delete filename [sensord*]? Delete flash:/sensord_CSPRNG1? [confirm]y Delete flash:/sensord_CSPRNG0? [confirm]y ap#show startup-config startup-config is not present ap#show vlans No Virtual LANs configured.
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Turn off/unplug the device and close PuTTy and the TFTP server.