Cisco AIR-CAP3702I-Z-K9

  1. Start a TFTP server and the console session.

    Download the boot image ap3g2-k9w7-tar.default to the "Base Directory" set in a running Tftp64 server (Ensure the PC firewall allows incoming and outgoing connections to the TFTP server on port 69).
    Plug in a serial cable to "CONSOLE" port of the access point from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug in an ethernet cable into an ethernet port of a PC from either (a) the ethernet port of the access point, or (b) the "To Switch" port of a running power injector device.
    Manually set the ethernet PC interface IP to the same subnet as the default IP of the Access Point which is 10.0.0.1 and ensure the same IP is selected in the TFTP "Server interfaces" dropdown:
    PC ethernet interface IP settings Tftp settings
  2. Power on the access point.

    Press and hold down the "Mode" button:
    Cisco AIR-CAP3702I-Z-K9
    Plug in either (a) a running 56 volt power supply into the power port, or (b) a Power over Ethernet cable to the PoE port of the Access Point from the "To AP" port of the power injector:
    IOS Bootloader - Starting system. flash is writable Tide XL MB - 40MB of flash Xmodem file system is available. flashfs[0]: 81 files, 9 directories flashfs[0]: 0 orphaned files, 0 orphaned directories flashfs[0]: Total bytes: 41158656 flashfs[0]: Bytes used: 21446144 flashfs[0]: Bytes available: 19712512 flashfs[0]: flashfs fsck took 11 seconds. Base Ethernet MAC address: a0:23:9f:d8:d9:50 Ethernet speed is 1000 Mb - FULL Duplex button is pressed, wait for button to be released...
    Release the Mode button after 20-30 seconds.
    button pressed for 26 seconds process_config_recovery: set IP address and config to default 10.0.0.1 process_config_recovery: image recovery image_recovery: Download default IOS tar image tftp://255.255.255.255/ap3g2-k9w7-tar.default
    It should start extracting files from the autonomous image:
    examining image... DPAA Set for Independent Mode tide_boot_speed = 1000 DPAA_INIT = 0x0 extracting info (285 bytes) Image info: Version Suffix: k9w7-.153-3.JF12 Image Name: ap3g2-k9w7-mx.153-3.JF12 Version Directory: ap3g2-k9w7-mx.153-3.JF12 Ios Image Size: 10670592 Total Image Size: 13814272 Image Feature: WIRELESS LAN Image Family: AP3G2 Wireless Switch Management Version: 8.5.161.0 Extracting files...
  3. Check the autonomous image is running with no configuration

    When the files finish extracting the access point should automatically reboot:
    Deleting current version: flash:/ap3g2-rcvk9w8-mx...done. New software image installed in flash:/ap3g2-k9w7-mx.153-3.JF12 Configuring system to use new image...done. Requested system reload in progress...download took about 561 seconds Rebooting system to reset DPAA...
    Further output should bring you to the Press RETURN to get started! prompt. Press the Enter key to get to the ap> prompt:
    Press RETURN to get started! ap>
    Type enable for elevated privileges, and Cisco when prompted for a password. Check there is no left over data using the dir and del and rmdir and show startup-config and show vlans commands:
    ap>enable Password: Cisco ap#dir Directory of flash:/ 2 -rwx 130232 Apr 4 2018 06:12:01 +00:00 event.log 3 -rwx 74 Apr 5 2018 08:36:27 +00:00 capwap-saved-config 86 drwx 2496 Jan 1 1970 00:09:36 +00:00 ap3g2-k9w7-mx.153-3.JF12 5 -rwx 50224 Apr 5 2018 20:47:36 +00:00 lwapp_non_apspecific_reap.cfg 6 drwx 2176 Jun 27 2017 22:44:54 +00:00 ap3g2-k9w8-mx.v153_80mr.201605200400 74 drwx 320 Jun 28 2017 01:19:41 +00:00 configs 75 -rwx 74 Apr 5 2018 21:38:51 +00:00 capwap-saved-config-bak 76 -rwx 64 Apr 4 2018 06:12:01 +00:00 sensord_CSPRNG0 78 -rwx 280 Apr 5 2018 08:36:28 +00:00 lwapp_officeextend.cfg 82 -rwx 121177 Jan 16 2018 14:51:33 +00:00 event.r0 84 -rwx 95008 Apr 5 2018 03:48:45 +00:00 lwapp_reap.cfg.bak 85 -rwx 64 Apr 4 2018 06:12:01 +00:00 sensord_CSPRNG1 38 -rwx 234 Jan 1 1970 00:09:48 +00:00 env_vars 88 -rwx 64703 Apr 5 2018 03:48:05 +00:00 event.capwap 89 -rwx 12312 Apr 5 2018 21:38:51 +00:00 private-multiple-fs 90 -rwx 0 Jan 21 2018 22:34:17 +00:00 crashinfo_20180121-223417-UTC 91 -rwx 95008 Apr 5 2018 08:36:48 +00:00 lwapp_reap.cfg 40900608 bytes total (13016576 bytes free) ap#del lwapp* Delete filename [lwapp*]? Delete flash:/lwapp_non_apspecific_reap.cfg? [confirm]y Delete flash:/lwapp_officeextend.cfg? [confirm]y Delete flash:/lwapp_reap.cfg.bak? [confirm]y Delete flash:/lwapp_reap.cfg? [confirm]y ap#del configs/* Delete filename [configs/*]? Delete flash:configs/AP_STAMODE_FALLBACK_PAYLOAD_file? [confirm]y Delete flash:configs/AP_ARPCACHE_PAYLOAD_file? [confirm]y Delete flash:configs/AP_VIDEO_MCAST_GROUP_CFG_PAYLOAD_file? [confirm]y Delete flash:configs/TLV_WLAN_FEAT_STATUS_file? [confirm]y Delete flash:configs/AP_LAYER2_ACL_MAPPING_PAYLOAD_file? [confirm]y ap#rmdir configs Remove directory filename [configs]? Delete flash:/configs? [confirm]y Removed dir flash:/configs ap#del *config* Delete filename [*config*]? Delete flash:/capwap-saved-config? [confirm]y Delete flash:/configs? [confirm]y Delete flash:/capwap-saved-config-bak? [confirm]y ap#del event.* Delete filename [event.*]? Delete flash:/event.log? [confirm]y Delete flash:/event.r0? [confirm]y Delete flash:/event.capwap? [confirm]y ap#del crashinfo* Delete filename [crashinfo*]? Delete flash:/crashinfo_20180121-223417-UTC? [confirm]y ap#del private* Delete filename [private*]? Delete flash:/private-multiple-fs? [confirm]y ap#del env_vars Delete filename [env_vars]? Delete flash:/env_vars? [confirm]y ap#del sensord* Delete filename [sensord*]? Delete flash:/sensord_CSPRNG1? [confirm]y Delete flash:/sensord_CSPRNG0? [confirm]y ap#show startup-config startup-config is not present ap#show vlans No Virtual LANs configured.
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Turn off/unplug the device and close PuTTy and the TFTP server.