02-20-2013 11:30 AM - edited 07-03-2021 11:35 PM
Hi,
i was following cisco support community tread for how to chagne LAP1142N from LAP to Autonomous mode; was able to upload c1140-k9w7-tar.152-2.jb.tar to AP; AP boots with new image but i cannot access AP ove console port now.
Any ideas would be appreciated.
Thanks
02-20-2013 12:08 PM
If everything went correctly, you should be able to access the consol port, if not, maybe something did not go right with the upgrade. Reboot the AP and console in and see what is being output.
Thanks,
Scott
Help out other by using the rating system and marking answered questions as "Answered"
02-20-2013 01:48 PM
Here it goes, this is lgo capture during AP reset (press mode and power it on) and after one more reboot i initiated. Still not able to get to CLI over console.
Appreciate your assistance.
=================
using eeprom values
WRDTR,CLKTR: 0x84000800 0x40000000
RQDC ,RFDC : 0x8000003a 0x00000210
ddr init done
IOS Bootloader - Starting system.
Xmodem file system is available.
DDR values used from system serial eeprom.
WRDTR,CLKTR: 0x84000800, 0x40000000
RQDC, RFDC : 0x8000003a, 0x00000210
PCIE0: link is up.
PCIE0: VC0 is active
PCIE1: link is up.
PCIE1: VC0 is active
PCIEx: initialization done
flashfs[0]: 30 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 7425024
flashfs[0]: Bytes available: 24960000
flashfs[0]: flashfs fsck took 22 seconds.
Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: 1111111111
Ethernet speed is 1000 Mb - FULL duplex
button pressed for 28 seconds
process_config_recovery: set IP address and config to default 10.0.0.1
process_config_recovery: image recovery
image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default
examining image...
extracting info (277 bytes)
Image info:
Version Suffix: k9w7-.152-2.JB
Image Name: c1140-k9w7-mx.152-2.JB
Version Directory: c1140-k9w7-mx.152-2.JB
Ios Image Size: 9431552
Total Image Size: 10353152
Image Feature: WIRELESS LAN
Image Family: C1140
Wireless Switch Management Version: 7.4.1.37
Extracting files...
c1140-k9w7-mx.152-2.JB/ (directory) 0 (bytes)
c1140-k9w7-mx.152-2.JB/html/ (directory) 0 (bytes)
c1140-k9w7-mx.152-2.JB/html/level/ (directory) 0 (bytes)
c1140-k9w7-mx.152-2.JB/html/level/1/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/appsui.js (563 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/back.shtml (512 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/cookies.js (5032 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/1/forms.js (17492 bytes)...
extracting c1140-k9w7-mx.152-2.JB/html/level/1/sitewide.js (16554 bytes)...
extracting c1140-k9w7-mx.152-2.JB/html/level/1/config.js (25507 bytes).....
extracting c1140-k9w7-mx.152-2.JB/html/level/1/stylesheet.css (3220 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/popup_capabilitycodes.shtml.gz (1020 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter.js.gz (1862 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter_vlan.js.gz (1408 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter_mac_ether.js.gz (1793 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/security.js.gz (962 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/vlan.js.gz (959 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ssid.js.gz (4151 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/1/dot1x.js.gz (988 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/network-if.js.gz (2084 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/stp.js.gz (957 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_assoc.shtml.gz (5614 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_event-log.shtml.gz (3907 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_home.shtml.gz (6972 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_network-if.shtml.gz (3565 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_network-map.shtml.gz (3880 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_services.shtml.gz (3697 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_system-sw.shtml.gz (2888 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_contextmgr.shtml.gz (3706 bytes)
c1140-k9w7-mx.152-2.JB/html/level/1/images/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/ap_title_appname.gif (2042 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/c1040_title_appname.gif (2058 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button.gif (1211 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_1st.gif (1171 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_cbottom.gif (318 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_current.gif (1206 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_endcap.gif (878 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_encap_last.gif (333 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_last.gif (386 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_nth.gif (1177 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_dkgreen.gif (869 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_green.gif (879 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_upright.gif (64 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_yellow.gif (881 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/arrowdown_red.gif (108 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/arrowup_green.gif (108 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/corner_ur_7.gif (53 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/dkgreenmask11_up.gif (113 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/dkgreenmask28_upright.gif (110 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/grn_vertlines_bottom.gif (149 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/grn_vertlines_top.gif (141 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/hinav_plus.gif (56 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/left_bkg.gif (146 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/list_data.gif (122 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/logo.gif (29454 bytes)......
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/pixel.gif (49 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_downleft.gif (53 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_help_off.gif (934 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_help_on.gif (934 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_print_off.gif (111 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_print_on.gif (111 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/spacer.gif (49 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/whitemask11_botleft.gif (62 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/whitemask11_upright.gif (61 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_alert.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_critical.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_debugging.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_emergency.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_error.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_information.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_notification.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_warning.gif (73 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/check_mark.gif (71 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/background_web41.jpg (732 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/cisco-logo-2012.gif (579 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/logout_image.gif (40294 bytes)........
c1140-k9w7-mx.152-2.JB/html/level/15/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_assoc_adv.shtml.gz (4133 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_event-log_config-options.shtml.gz (5651 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_event-log_notif-options.shtml.gz (2683 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_express-setup.shtml.gz (11835 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_express-security.shtml.gz (13539 bytes)...
extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_broadcast-ssid.shtml.gz (1263 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_no-security.shtml.gz (1582 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_eap-security.shtml.gz (1791 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_wep-security.shtml.gz (1597 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_wpa-security.shtml.gz (1854 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ipaddress.shtml.gz (4594 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11.shtml.gz (6308 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_b.shtml.gz (6265 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_c.shtml.gz (26662 bytes).....
extracting c1140-k9w7-mx.152-2.JB/html/level/15/dBm_mW_translation_table.shtml.gz (1511 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_d.shtml.gz (4059 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ethernet.shtml.gz (4340 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ethernet_b.shtml.gz (5488 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz (3795 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec.shtml.gz (7307 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security.shtml.gz (26298 bytes).....
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-key-security.shtml.gz (12303 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_band_select.shtml.gz (5699 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_local-admin-access.shtml.gz (6978 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_network-security_a.shtml.gz (10182 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_network-security_b.shtml.gz (5594 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs.shtml.gz (5077 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs_b.shtml.gz (8514 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs_c.shtml.gz (6163 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz (4973 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz (5051 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz (4658 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz (3596 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ids_mfp.shtml.gz (3912 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (3642 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-security.shtml.gz (6432 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-certificates.shtml.gz (11155 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz (577 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_arp.shtml.gz (3005 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_cdp.shtml.gz (5112 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_console-telnet.shtml.gz (6811 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_dns.shtml.gz (3575 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters.shtml.gz (5207 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-ip.shtml.gz (8411 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-mac.shtml.gz (3998 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-ether.shtml.gz (3842 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_hot-standby.shtml.gz (5495 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_http.shtml.gz (5977 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-b.shtml.gz (6656 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-c.shtml.gz (4153 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-d.shtml.gz (5159 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip.shtml.gz (6007 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos-traffic.shtml.gz (8125 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos.shtml.gz (12165 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos_adv.shtml.gz (4433 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_voice.shtml.gz (4079 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_voice-traffic.shtml.gz (6347 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_snmp.shtml.gz (8002 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_sntp.shtml.gz (5948 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_vlan.shtml.gz (12780 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_stp.shtml.gz (7107 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_stationview-client_ltest.shtml.gz (5514 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade-b.htm (231 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6196 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade.htm (229 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade.shtml.gz (6238 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/banner.html (9573 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameAssociation.html (628 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameEventlog.html (627 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameHome.html (611 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameNetWork.html (619 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameSecurity.html (637 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameServices.html (651 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameSoftware.html (650 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameWireless.html (626 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameset.html (4394 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navAssociation.html (897 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navBar41.css (3605 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navHome.html (1554 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navNetwork.html (3935 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navSecurity.html (2374 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navServices.html (4508 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navSoftware.html (1586 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navWireless.html (1207 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_down.gif (177 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_down2.gif (838 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_right.gif (137 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_right2.gif (838 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/servicescript41.js.gz (12165 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/sideMenu.js.gz (813 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_easy-setup.shtml.gz (27004 bytes).....
extracting c1140-k9w7-mx.152-2.JB/html/level/15/navEventLog.html (911 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/content41.css (10497 bytes)..
extracting c1140-k9w7-mx.152-2.JB/html/level/15/logout.html (2369 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade_poll.htm (234 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade_poll.shtml (3596 bytes)
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_sysconfig.shtml.gz (7145 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_stationview-client.shtml.gz (5554 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_ap.shtml.gz (4774 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm.shtml.gz (5294 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm-groups.shtml.gz (7511 bytes).
extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5061 bytes).
extracting c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB (9233742 bytes)...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
extracting c1140-k9w7-mx.152-2.JB/8001.img (186220 bytes)........................................
extracting c1140-k9w7-mx.152-2.JB/T2.bin (8080 bytes).
extracting c1140-k9w7-mx.152-2.JB/T5.bin (23836 bytes).....
extracting c1140-k9w7-mx.152-2.JB/info (277 bytes)
extracting info.ver (277 bytes)
Deleting current version: flash:/c1140-rcvk9w8-mx...done.
New software image installed in flash:/c1140-k9w7-mx.152-2.JB
Configuring system to use new image...done.
Requested system reload in progress...download took about 387 seconds
Loading "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB"...##############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
File "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB" uncompressed and installed, entry point: 0x4000
executing...
enet halted
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Tue 11-Dec-12 04:23 by prod_rel_team
Initializing flashfs...
FLASH CHIP: Numonyx P33
Checking for Over Erased blocks
......................................................................................................................................................................................................................................................
flashfs[3]: found corrupted block[3] (byte 0, sector 0), fixing...
flashfs[3]: found corrupted block[4] (byte 0, sector 0), fixing...
flashfs[3]: 205 files, 13 directories
flashfs[3]: 0 orphaned files, 0 orphaned directories
flashfs[3]: Total bytes: 32126976
flashfs[3]: Bytes used: 15453696
flashfs[3]: Bytes available: 16673280
flashfs[3]: flashfs fsck took 7 seconds.
flashfs[3]: Initialization complete.
flashfs[4]: 0 files, 1 directories
flashfs[4]: 0 orphaned files, 0 orphaned directories
flashfs[4]: Total bytes: 11999232
flashfs[4]: Bytes used: 1024
flashfs[4]: Bytes available: 11998208
flashfs[4]: flashfs fsck took 1 seconds.
flashfs[4]: Initialization complete....done Initializing flashfs.
Radio0 present 8363 8000 90020000 0 90030000 B
Rate table has 80 entries (32 SGI/4 BF variants)
Radio1 present 8363 8000 98020000 0 98030000 0
Ethernet speed is 1000 Mb - FULL duplex
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
cisco AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision A0) with 81910K/49152K bytes of memory.
PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from power-on
1 Gigabit Ethernet interface
2 802.11 Radios
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address:
Part Number : 73-11451-06
PCA Assembly Number : 800-30554-03
PCA Revision Number : A0
PCB Serial Number :
Top Assembly Part Number : 800-31273-01
Top Assembly Serial Number :
Top Revision Number : A0
Product/Model Number : AIR-LAP1142N-A-K9
Press RETURN to get started!
*Mar 1 00:00:10.177: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
*Mar 1 00:00:10.181: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed
*Mar 1 00:00:10.183: *** CRASH_LOG = YES
*Mar 1 00:00:11.941: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0
*Mar 1 00:00:12.825: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1Base Ethernet MAC address: C4:7D:4F:3A:0E:D8
*Mar 1 00:00:13.032: not a autoconfig enabled device!!!
*Mar 1 00:00:14.973: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar 1 00:00:15.973: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar 1 00:01:01.900: Starting Ethernet promiscuous mode
*Mar 1 00:01:02.034: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Mar 1 00:01:02.034: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Mar 1 00:01:02.051: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Tue 11-Dec-12 04:23 by prod_rel_team
*Mar 1 00:01:02.051: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold start
*Mar 1 00:01:03.027: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Mar 1 00:01:03.034: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Mar 1 00:01:03.034: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Mar 1 00:01:15.338: %CDP_PD-4-POWER_OK: Full power - INJECTOR_CONFIGURED_ON_SOURCE inline power source
using eeprom values
WRDTR,CLKTR: 0x84000800 0x40000000
RQDC ,RFDC : 0x8000003a 0x00000210
ddr init done
IOS Bootloader - Starting system.
Xmodem file system is available.
DDR values used from system serial eeprom.
WRDTR,CLKTR: 0x84000800, 0x40000000
RQDC, RFDC : 0x8000003a, 0x00000210
PCIE0: link is up.
PCIE0: VC0 is active
PCIE1: link is up.
PCIE1: VC0 is active
PCIEx: initialization done
flashfs[0]: 205 files, 13 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 15454720
flashfs[0]: Bytes available: 16930304
flashfs[0]: flashfs fsck took 25 seconds.
Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: c4:7d:4f:3a:0e:d8
Ethernet speed is 1000 Mb - FULL duplex
Loading "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB"...##############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
File "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB" uncompressed and installed, entry point: 0x4000
executing...
enet halted
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Tue 11-Dec-12 04:23 by prod_rel_team
Initializing flashfs...
FLASH CHIP: Numonyx P33
Checking for Over Erased blocks
......................................................................................................................................................................................................................................................
flashfs[3]: 205 files, 13 directories
flashfs[3]: 0 orphaned files, 0 orphaned directories
flashfs[3]: Total bytes: 32126976
flashfs[3]: Bytes used: 15454720
flashfs[3]: Bytes available: 16672256
flashfs[3]: flashfs fsck took 6 seconds.
flashfs[3]: Initialization complete.
flashfs[4]: 0 files, 1 directories
flashfs[4]: 0 orphaned files, 0 orphaned directories
flashfs[4]: Total bytes: 11999232
flashfs[4]: Bytes used: 1024
flashfs[4]: Bytes available: 11998208
flashfs[4]: flashfs fsck took 1 seconds.
flashfs[4]: Initialization complete....done Initializing flashfs.
Radio0 present 8363 8000 90020000 0 90030000 B
Rate table has 80 entries (32 SGI/4 BF variants)
Radio1 present 8363 8000 98020000 0 98030000 0
Ethernet speed is 1000 Mb - FULL duplex
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
cisco AIR-AP1142N-A-K9 (PowerPC405ex) processor (revision A0) with 81910K/49152K bytes of memory.
Processor board ID
PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from power-on
1 Gigabit Ethernet interface
2 802.11 Radios
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address
Part Number :
PCA Assembly Number : 800-30554-03
PCA Revision Number : A0
PCB Serial Number :
Top Assembly Part Number : 800-31273-01
Top Assembly Serial Number
Top Revision Number : A0
Product/Model Number : AIR-LAP1142N-A-K9
Press RETURN to get started!
*Mar 1 00:00:08.849: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory
*Mar 1 00:00:08.853: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed
*Mar 1 00:00:08.854: *** CRASH_LOG = YES
*Mar 1 00:00:10.613: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0
*Mar 1 00:00:11.497: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1Base Ethernet MAC address: C4:7D:4F:3A:0E:D8
*Mar 1 00:00:11.703: not a autoconfig enabled device!!!
*Mar 1 00:00:13.644: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar 1 00:00:14.644: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar 1 00:01:00.572: Starting Ethernet promiscuous mode
*Mar 1 00:01:00.707: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
*Mar 1 00:01:00.707: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
*Mar 1 00:01:00.722: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Tue 11-Dec-12 04:23 by prod_rel_team
*Mar 1 00:01:00.722: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold start
*Mar 1 00:01:01.698: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Mar 1 00:01:01.707: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Mar 1 00:01:01.707: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Mar 1 00:01:13.444: %CDP_PD-4-POWER_OK: Full power - INJECTOR_CONFIGURED_ON_SOURCE inline power source
===================================================
02-20-2013 03:45 PM
You can see the output so you should be able to hit the CLI.
Sent from Cisco Technical Support iPhone App
09-19-2013 04:52 AM
hi
Did notice a similar output and ending with same output using secureCRT terminal client.
But when switched to a teraterm, it worked and console responded to key input.
HTH
09-19-2013 04:06 PM
Here’s a quick walk through to get a Cisco AP – in my case an 1130AG – from a controller based LWAPP image back to the autonomous image so it can be used as a standalone AP again.
Retrieve the latest IOS image for your AP from Cisco.com
Retreive TFTPD for use as your TFTP server from here
You’ll need a PC with a static IP (10.0.0.1/24 for this example) to wire your AP straight into during the procedure, with the TFTP server running, all firewalls disabled and the IOS image available in the TFTP root.
Step 1: Make sure that the PC contains the access point image file (such as c1130-k9w7-tar.124-10b.JDA3.tar for an 1130 series access point) in the TFTP server folder and that the TFTP server is activated.
Step 2: Set the timeout value on the TFTP server to 30 seconds.
Step 3: On the PC where the TFTP server is located, perform these steps:
a. Disable any software firewall products, such as Windows firewall, ZoneAlarm firewall, McAffee firewall, or others.
b. Ensure all Windows files are visible. From Windows Explorer, click Tools > Folder Options > View; then uncheck the Hide extensions for known file types check box.
Step 4: Connect the PC to the access point using a Category 5 Ethernet cable.
Step 5: Disconnect power from the access point.
Step 6: Press and hold MODE while you reconnect power to the access point.
Step 7: Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds) and then release.
Step 8: Enable LWAPP console CLI allow/disallow debugging
#debug lwapp con cli
Step 9: Enable LWAPP ignore internal reload debugging
#debug lwapp client no-reload
Step 10: Configure IP Address on the fast ethernet interface of the AP
#conf t
(config)#interface fa0
(config-if)#ip addr 10.0.0.2 255.255.255.0
Step 11: Download the image file from the TFTP server to the AP
#archive download-sw /overwrite tftp://10.0.0.1/c1130-k9w7-tar.124-10b.JDA3.tar
Step 12: Reload the unit once the image has been written and the process reports complete.
#reload.
You’ll now be running an autonomous image which you can work with.
01-10-2014 01:17 AM
Hi,
It should be uploaded with the autonomous AP.
The console just doesn't response to your key input. Try to uncheck the RTS/CTS Flow Control on your SecureCRT Serial Session.
Tks
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide