Cisco AIR-CAP3602I-N-K9

  1. Start a TFTP server and the console session.

    Download the boot image ap3g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
    Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
    Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
    PC ethernet interface IP settings Tftp settings
  2. Power on the access point.

    Press and hold down the "Mode" button:
    Cisco AIR-CAP3602I-N-K9
    Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
    IOS Bootloader - Starting system. flash is writable FLASH CHIP: Macronix Mirrorbit (00C2) Xmodem file system is available. flashfs[0]: 74 files, 8 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 31997952 flashfs[0]: Bytes used: 21452800 flashfs[0]: Bytes available: 10545152 flashfs[0]: flashfs fsck took 19 seconds. Reading cookie from SEEPROM Base Ethernet MAC address: b0:fa:eb:47:e9:f4 Ethernet speed is 1000 Mb - FULL Duplex Mode button pressed.
    Release the Mode button after 20-30 seconds.
    Mode button held for at least 20 seconds. process_config_recovery: set IP address and config to default 10.0.0.1 process_config_recovery: image recovery image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g2-k9w7-tar.default
    It should start extracting files from the autonomous image:
    examining image... DPAA Set for Independent Mode DPAA_INIT = 0x0 extracting info (285 bytes) Image info: Version Suffix: k9w7-.153-3.JF12 Image Name: ap3g2-k9w7-mx.153-3.JF12 Version Directory: ap3g2-k9w7-mx.153-3.JF12 Ios Image Size: 10670592 Total Image Size: 13814272 Image Feature: WIRELESS LAN Image Family: AP3G2 Wireless Switch Management Version: 8.5.161.0 Not enough free space to download image first w/o extracting deleting existing version(s)... Deleting current version: flash:/ap3g2-rcvk9w8-mx...done. Extracting files...
  3. Check the autonomous image is running with no configuration

    When the files finish extracting the access point should automatically reboot:
    New software image installed in flash:/ap3g2-k9w7-mx.153-3.JF12 Configuring system to use new image...done. Requested system reload in progress...download took about 904 seconds Rebooting system to reset DPAA...
    Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
    Press RETURN to get started! ap>
    Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
    ap>enable Password: Cisco ap#dir Directory of flash:/ 2 -rwx 56324 Mar 25 2021 13:10:08 +00:00 event.log 3 drwx 640 Mar 1 2013 00:56:42 +00:00 configs 4 -rwx 64428 Apr 26 2021 06:48:13 +00:00 lwapp_non_apspecific_reap.cfg 5 -rwx 373 Mar 1 2013 00:56:42 +00:00 env_vars 6 -rwx 63266 Apr 19 2021 06:46:35 +00:00 event.capwap 7 -rwx 12312 Mar 1 2013 00:56:42 +00:00 private-multiple-fs 47 -rwx 64 Mar 25 2021 13:10:02 +00:00 sensord_CSPRNG0 9 drwx 128 Mar 1 2013 00:55:17 +00:00 ap3g2-rcvk9w8-mx 48 -rwx 64 Mar 25 2021 13:10:02 +00:00 sensord_CSPRNG1 87 -rwx 138014 Aug 30 2019 00:36:56 +00:00 event.r0 8 -rwx 0 Mar 1 2013 00:57:01 +00:00 config.txt 12 -rwx 297 Apr 21 2021 10:43:21 +00:00 capwap-saved-config 86 -rwx 0 Apr 8 2019 06:05:53 +00:00 ce 14 -rwx 297 Apr 25 2021 18:17:55 +00:00 capwap-saved-config-bak 15 -rwx 141310 Nov 25 2019 03:29:52 +00:00 event.r1 17 drwx 2496 May 7 2020 04:03:19 +00:00 ap3g2-k9w8-mx.153-3.JF9 84 -rwx 118 Apr 21 2021 10:43:20 +00:00 pnp-saved-config 91 -rwx 95008 Apr 21 2021 10:42:09 +00:00 lwapp_reap.cfg.bak 31739904 bytes total (10277888 bytes free) ap#del lwapp* Delete filename [lwapp*]? Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y Delete flash:/lwapp_reap.cfg.bak? [confirmy ap#del configs/* Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm] *Mar 1 00:59:10.919: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does not have an Ip !! y Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y Delete flash:configs/lwapp_lsaclmap.cfg? [confirm]y Delete flash:configs/lwapp_centraldhcpMap.cfg? [confirm]y Delete flash:configs/TLV_FLEX_LOCAL_AUTH_PARAM_PAYLOAD_file? [confirm]y Delete flash:configs/AP_SUBNET_BCAST_DROP_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_FLEX_VLAN_NAME_ID_MAPPING_PAYLOAD_file? [confirm]y ap#rmdir configs Remove directory filename [configs]? Delete flash:/configs? [confirm]y Removed dir flash:/configs ap#del *config* Delete filename [*config*]? Delete flash:/config.txt? [confirm]y Delete flash:/capwap-saved-config? [confirm]y Delete flash:/capwap-saved-config-bak? [confirm]y Delete flash:/pnp-saved-config? [confirm]y ap#del ce Delete filename [ce]? Delete flash:/ce? [confirm]y ap#del event.* Delete filename [event.*]? Delete flash:/event.log? [confirm]y Delete flash:/event.capwap? [confirm]y Delete flash:/event.r0? [confirm]y Delete flash:/event.r1? [confirm]y ap#del private* Delete filename [private*]? Delete flash:/private-multiple-fs? [confirm]y ap#del env_vars Delete filename [env_vars]? Delete flash:/env_vars? [confirm]y ap#del sensord* Delete filename [sensord*]? Delete flash:/sensord_CSPRNG1? [confirm]y Delete flash:/sensord_CSPRNG0? [confirm]y ap#show startup-config startup-config is not present ap#show vlans No Virtual LANs configured.
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Turn off/unplug the device and close PuTTy and the TFTP server.