Cisco AIR-CAP3602I-N-K9
Start a TFTP server and the console session.
Download the boot image ap3g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
Power on the access point.
Press and hold down the "Mode" button:
Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
IOS Bootloader - Starting system.
flash is writable
FLASH CHIP: Macronix Mirrorbit (00C2)
Xmodem file system is available.
flashfs[0]: 74 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 31997952
flashfs[0]: Bytes used: 21452800
flashfs[0]: Bytes available: 10545152
flashfs[0]: flashfs fsck took 19 seconds.
Reading cookie from SEEPROM
Base Ethernet MAC address: b0:fa:eb:47:e9:f4
Ethernet speed is 1000 Mb - FULL Duplex
Mode button pressed.
Release the Mode button after 20-30 seconds.
Mode button held for at least 20 seconds.
process_config_recovery: set IP address and config to default 10.0.0.1
process_config_recovery: image recovery
image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g2-k9w7-tar.default
It should start extracting files from the autonomous image:
examining image...
DPAA Set for Independent Mode
DPAA_INIT = 0x0
extracting info (285 bytes)
Image info:
Version Suffix: k9w7-.153-3.JF12
Image Name: ap3g2-k9w7-mx.153-3.JF12
Version Directory: ap3g2-k9w7-mx.153-3.JF12
Ios Image Size: 10670592
Total Image Size: 13814272
Image Feature: WIRELESS LAN
Image Family: AP3G2
Wireless Switch Management Version: 8.5.161.0
Not enough free space to download image first w/o extracting
deleting existing version(s)...
Deleting current version: flash:/ap3g2-rcvk9w8-mx...done.
Extracting files...
Check the autonomous image is running with no configuration
When the files finish extracting the access point should automatically reboot:
New software image installed in flash:/ap3g2-k9w7-mx.153-3.JF12
Configuring system to use new image...done.
Requested system reload in progress...download took about 904 seconds
Rebooting system to reset DPAA...
Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
Press RETURN to get started!
ap>
Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
ap>enable
Password: Cisco
ap#dir
Directory of flash:/
2 -rwx 56324 Mar 25 2021 13:10:08 +00:00 event.log
3 drwx 640 Mar 1 2013 00:56:42 +00:00 configs
4 -rwx 64428 Apr 26 2021 06:48:13 +00:00 lwapp_non_apspecific_reap.cfg
5 -rwx 373 Mar 1 2013 00:56:42 +00:00 env_vars
6 -rwx 63266 Apr 19 2021 06:46:35 +00:00 event.capwap
7 -rwx 12312 Mar 1 2013 00:56:42 +00:00 private-multiple-fs
47 -rwx 64 Mar 25 2021 13:10:02 +00:00 sensord_CSPRNG0
9 drwx 128 Mar 1 2013 00:55:17 +00:00 ap3g2-rcvk9w8-mx
48 -rwx 64 Mar 25 2021 13:10:02 +00:00 sensord_CSPRNG1
87 -rwx 138014 Aug 30 2019 00:36:56 +00:00 event.r0
8 -rwx 0 Mar 1 2013 00:57:01 +00:00 config.txt
12 -rwx 297 Apr 21 2021 10:43:21 +00:00 capwap-saved-config
86 -rwx 0 Apr 8 2019 06:05:53 +00:00 ce
14 -rwx 297 Apr 25 2021 18:17:55 +00:00 capwap-saved-config-bak
15 -rwx 141310 Nov 25 2019 03:29:52 +00:00 event.r1
17 drwx 2496 May 7 2020 04:03:19 +00:00 ap3g2-k9w8-mx.153-3.JF9
84 -rwx 118 Apr 21 2021 10:43:20 +00:00 pnp-saved-config
91 -rwx 95008 Apr 21 2021 10:42:09 +00:00 lwapp_reap.cfg.bak
31739904 bytes total (10277888 bytes free)
ap#del lwapp*
Delete filename [lwapp*]?
Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y
Delete flash:/lwapp_reap.cfg.bak? [confirmy
ap#del configs/*
Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]
*Mar 1 00:59:10.919: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does not have an Ip !! y
Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y
Delete flash:configs/lwapp_lsaclmap.cfg? [confirm]y
Delete flash:configs/lwapp_centraldhcpMap.cfg? [confirm]y
Delete flash:configs/TLV_FLEX_LOCAL_AUTH_PARAM_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_SUBNET_BCAST_DROP_PAYLOAD_file? [confirm]y
Delete flash:configs/TLV_FLEX_VLAN_NAME_ID_MAPPING_PAYLOAD_file? [confirm]y
ap#rmdir configs
Remove directory filename [configs]?
Delete flash:/configs? [confirm]y
Removed dir flash:/configs
ap#del *config*
Delete filename [*config*]?
Delete flash:/config.txt? [confirm]y
Delete flash:/capwap-saved-config? [confirm]y
Delete flash:/capwap-saved-config-bak? [confirm]y
Delete flash:/pnp-saved-config? [confirm]y
ap#del ce
Delete filename [ce]?
Delete flash:/ce? [confirm]y
ap#del event.*
Delete filename [event.*]?
Delete flash:/event.log? [confirm]y
Delete flash:/event.capwap? [confirm]y
Delete flash:/event.r0? [confirm]y
Delete flash:/event.r1? [confirm]y
ap#del private*
Delete filename [private*]?
Delete flash:/private-multiple-fs? [confirm]y
ap#del env_vars
Delete filename [env_vars]?
Delete flash:/env_vars? [confirm]y
ap#del sensord*
Delete filename [sensord*]?
Delete flash:/sensord_CSPRNG1? [confirm]y
Delete flash:/sensord_CSPRNG0? [confirm]y
ap#show startup-config
startup-config is not present
ap#show vlans
No Virtual LANs configured.
Copy all the output from the session into your records.
Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
End the session.
Turn off/unplug the device and close PuTTy and the TFTP server.