finding the manufacture date on an access point via software

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-15-2007 01:26 PM - edited 07-03-2021 02:04 PM
I'd like to determine the manufacture date of our access points because we plan on converting to LWAPP? Can someone tell me the what CLI command to use and which field has the answer. thanks.
- Labels:
-
Aironet Access Points
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-16-2007 05:27 AM
Not sure if it is possible.
On a 1231AG-A-K9 for example, the show hardware does not give a date for manufacture, but it does return the following:
Part Number : 73-8704-07
PCA Assembly Number : 800-23211-08
PCA Revision Number : A0
PCB Serial Number : FOC084103AQ
Top Assembly Part Number : 800-23304-07
Top Assembly Serial Number : FTX0843J239
Top Revision Number : B0
Product/Model Number : AIR-AP1231G-A-K9
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-16-2007 06:44 AM
Hi Thomas,
Not sure about finding the Manufacture date (maybe you are trying to find out about the presence of a MIC certificate) but we did go through this coversion from Autonomous to Lightweight on our infrastructure last summer.In this process we did convert about 70 1121's and 1231's to LWAPP and it worked very well. Here are some relevant docs;
Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode
From this excellent doc;
http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_technical_reference09186a00804fc3dc.html
The following Cisco Aironet access points have the ability to operate as autonomous access points or lightweight access points:
Cisco Aironet 1240 AG Series Access Points
Cisco Aironet 1230 AG Series Access Points
Cisco Aironet 1200 Series Access Points that contain 802.11g (AIR-MP21G-x-K9) and/or second-generation 802.11a radios (AIR-RM21A-x-K9 or AIR-RM22A-x-K9)
Cisco Aironet 1130 AG Series Access Points
Cisco Aironet 1100 Series Access Points that contain 802.11g radios (AIR-AP1121G-x-K9)
Cisco Aironet 1300 Series Access Points/Bridges (AIR-BR1310G-x-K9 or AIR-BR1310G-x-K9-R).
From this doc;
http://www.cisco.com/en/US/products/ps6521/prod_bulletin0900aecd80321a2c.html
Guidelines and Tools for Migrating to the Cisco Unified Wireless Network
Self-Signed Certificate Manual Addition to the Controller for LWAPP-Converted APs
LWAPP secures the control communication between the AP and the WLC by means of a secure key distribution. The secure key distribution requires already provisioned X.509 digital certificates on both the LAP and the WLC. Factory-installed certificates are referenced with the term "MIC", which is an acronym for Manufacturing Installed Certificate. Aironet APs that shipped before July 18, 2005, do not have MICs. So these APs create an SSC when they are converted to operate in lightweight mode. Controllers are programmed to accept SSCs for the authentication of specific APs.
http://www.cisco.com/en/US/products/ps6521/products_configuration_example09186a00806a426c.shtml
LWAPP Upgrade Tool Troubleshoot Tips
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008072d9a1.shtml
Also, 5 points for Eric! For all your great work here lately.
Hope this helps!
Rob
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-22-2007 12:28 PM
The command (requires enable level) you want to determine if the AP has Manufacture Installed Certificates is: "test pb display"
Example below AP *HAS* MIC
ap1# test pb display
------------------------------
Display of the Parameter Block
------------------------------
Total Number of Records : 7
Number of Certs : 6
Number of Keys : 1
ap1#
From an older AP without a MIC you get:
ap2# test pb display
Parameter Block Doesnt have any Records
ap2#
Separately, has anyone come up with a way to put the necessary SSCs into an older AP *without* using that PC based upgrade tool? We want a way where we can define SSCs and capture the SHA1 Hashes well in advance of us upgrading the AP firmware and switching away from autonomous mode.
