Cisco AIR-CAP3702I-Z-K9
Start a TFTP server and the console session.
Download the boot image ap3g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
Power on the access point.
Press and hold down the "Mode" button:
Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
IOS Bootloader - Starting system.
flash is writable
Tide XL MB - 40MB of flash
Xmodem file system is available.
flashfs[0]: 81 files, 9 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 41158656
flashfs[0]: Bytes used: 21446144
flashfs[0]: Bytes available: 19712512
flashfs[0]: flashfs fsck took 11 seconds.
Base Ethernet MAC address: a0:23:9f:d8:d9:50
Ethernet speed is 1000 Mb - FULL Duplex
button is pressed, wait for button to be released...
Release the Mode button after 20-30 seconds.
button pressed for 26 seconds
process_config_recovery: set IP address and config to default 10.0.0.1
process_config_recovery: image recovery
image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g2-k9w7-tar.default
It should start extracting files from the autonomous image:
examining image...
DPAA Set for Independent Mode
tide_boot_speed = 1000
DPAA_INIT = 0x0
extracting info (285 bytes)
Image info:
Version Suffix: k9w7-.153-3.JF12
Image Name: ap3g2-k9w7-mx.153-3.JF12
Version Directory: ap3g2-k9w7-mx.153-3.JF12
Ios Image Size: 10670592
Total Image Size: 13814272
Image Feature: WIRELESS LAN
Image Family: AP3G2
Wireless Switch Management Version: 8.5.161.0
Extracting files...
Check the autonomous image is running with no configuration
When the files finish extracting the access point should automatically reboot:
Deleting current version: flash:/ap3g2-rcvk9w8-mx...done.
New software image installed in flash:/ap3g2-k9w7-mx.153-3.JF12
Configuring system to use new image...done.
Requested system reload in progress...download took about 561 seconds
Rebooting system to reset DPAA...
Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
Press RETURN to get started!
ap>
Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
ap>enable
Password: Cisco
ap#dir
Directory of flash:/
2 -rwx 130232 Apr 4 2018 06:12:01 +00:00 event.log
3 -rwx 74 Apr 5 2018 08:36:27 +00:00 capwap-saved-config
86 drwx 2496 Jan 1 1970 00:09:36 +00:00 ap3g2-k9w7-mx.153-3.JF12
5 -rwx 50224 Apr 5 2018 20:47:36 +00:00 lwapp_non_apspecific_reap.cfg
6 drwx 2176 Jun 27 2017 22:44:54 +00:00 ap3g2-k9w8-mx.v153_80mr.201605200400
74 drwx 320 Jun 28 2017 01:19:41 +00:00 configs
75 -rwx 74 Apr 5 2018 21:38:51 +00:00 capwap-saved-config-bak
76 -rwx 64 Apr 4 2018 06:12:01 +00:00 sensord_CSPRNG0
78 -rwx 280 Apr 5 2018 08:36:28 +00:00 lwapp_officeextend.cfg
82 -rwx 121177 Jan 16 2018 14:51:33 +00:00 event.r0
84 -rwx 95008 Apr 5 2018 03:48:45 +00:00 lwapp_reap.cfg.bak
85 -rwx 64 Apr 4 2018 06:12:01 +00:00 sensord_CSPRNG1
38 -rwx 234 Jan 1 1970 00:09:48 +00:00 env_vars
88 -rwx 64703 Apr 5 2018 03:48:05 +00:00 event.capwap
89 -rwx 12312 Apr 5 2018 21:38:51 +00:00 private-multiple-fs
90 -rwx 0 Jan 21 2018 22:34:17 +00:00 crashinfo_20180121-223417-UTC
91 -rwx 95008 Apr 5 2018 08:36:48 +00:00 lwapp_reap.cfg
40900608 bytes total (13016576 bytes free)
ap#del lwapp*
Delete filename [lwapp*]?
Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y
Delete flash:/lwapp_officeextend.cfg? [confirm]y
Delete flash:/lwapp_reap.cfg.bak? [confirm]y
Delete flash:/lwapp_reap.cfg? [confirm]y
ap#del configs/*
Delete filename [configs/*]?
Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y
Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y
Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]y
Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y
ap#rmdir configs
Remove directory filename [configs]?
Delete flash:/configs? [confirm]y
Removed dir flash:/configs
ap#del *config*
Delete filename [*config*]?
Delete flash:/capwap-saved-config? [confirm]y
Delete flash:/configs? [confirm]y
Delete flash:/capwap-saved-config-bak? [confirm]y
ap#del event.*
Delete filename [event.*]?
Delete flash:/event.log? [confirm]y
Delete flash:/event.r0? [confirm]y
Delete flash:/event.capwap? [confirm]y
ap#del crashinfo*
Delete filename [crashinfo*]?
Delete flash:/crashinfo_20180121-223417-UTC? [confirm]y
ap#del private*
Delete filename [private*]?
Delete flash:/private-multiple-fs? [confirm]y
ap#del env_vars
Delete filename [env_vars]?
Delete flash:/env_vars? [confirm]y
ap#del sensord*
Delete filename [sensord*]?
Delete flash:/sensord_CSPRNG1? [confirm]y
Delete flash:/sensord_CSPRNG0? [confirm]y
ap#show startup-config
startup-config is not present
ap#show vlans
No Virtual LANs configured.
Copy all the output from the session into your records.
Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
End the session.
Turn off/unplug the device and close PuTTy and the TFTP server.