cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2315
Views
0
Helpful
6
Replies

From LAP to Autonomous

endpoint
Level 1
Level 1

Hi,

i was following cisco support community tread for how to chagne LAP1142N from LAP to Autonomous mode; was able to upload c1140-k9w7-tar.152-2.jb.tar to AP; AP boots with new image but i cannot access AP ove console port now.

Any ideas would be appreciated.

Thanks

6 Replies 6

Scott Fella
Hall of Fame
Hall of Fame

If everything went correctly, you should be able to access the consol port, if not, maybe something did not go right with the upgrade.  Reboot the AP and console in and see what is being output.

Thanks,

Scott

Help out other by using the rating system and marking answered questions as "Answered"

-Scott
*** Please rate helpful posts ***

Here it goes, this is lgo capture during AP reset (press mode and power it on) and after one more reboot i initiated. Still not able to get to CLI over console.

Appreciate your assistance.

=================

using  eeprom values

WRDTR,CLKTR: 0x84000800 0x40000000

RQDC ,RFDC : 0x8000003a 0x00000210

ddr init done

IOS Bootloader - Starting system.

Xmodem file system is available.

DDR values used from system serial eeprom.

WRDTR,CLKTR: 0x84000800, 0x40000000

RQDC, RFDC : 0x8000003a, 0x00000210

PCIE0: link is up.

PCIE0: VC0 is active

PCIE1: link is up.

PCIE1: VC0 is active

PCIEx: initialization done

flashfs[0]: 30 files, 8 directories

flashfs[0]: 0 orphaned files, 0 orphaned directories

flashfs[0]: Total bytes: 32385024

flashfs[0]: Bytes used: 7425024

flashfs[0]: Bytes available: 24960000

flashfs[0]: flashfs fsck took 22 seconds.

Reading cookie from system serial eeprom...Done

Base Ethernet MAC address: 1111111111

Ethernet speed is 1000 Mb - FULL duplex

button pressed for 28 seconds

process_config_recovery: set IP address and config to default 10.0.0.1

process_config_recovery: image recovery

image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default

examining image...

extracting info (277 bytes)

Image info:

    Version Suffix: k9w7-.152-2.JB

    Image Name: c1140-k9w7-mx.152-2.JB

    Version Directory: c1140-k9w7-mx.152-2.JB

    Ios Image Size: 9431552

    Total Image Size: 10353152

    Image Feature: WIRELESS LAN

    Image Family: C1140

    Wireless Switch Management Version: 7.4.1.37

Extracting files...

c1140-k9w7-mx.152-2.JB/ (directory) 0 (bytes)

c1140-k9w7-mx.152-2.JB/html/ (directory) 0 (bytes)

c1140-k9w7-mx.152-2.JB/html/level/ (directory) 0 (bytes)

c1140-k9w7-mx.152-2.JB/html/level/1/ (directory) 0 (bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/appsui.js (563 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/back.shtml (512 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/cookies.js (5032 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/1/forms.js (17492 bytes)...

extracting c1140-k9w7-mx.152-2.JB/html/level/1/sitewide.js (16554 bytes)...

extracting c1140-k9w7-mx.152-2.JB/html/level/1/config.js (25507 bytes).....

extracting c1140-k9w7-mx.152-2.JB/html/level/1/stylesheet.css (3220 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/popup_capabilitycodes.shtml.gz (1020 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter.js.gz (1862 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter_vlan.js.gz (1408 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/filter_mac_ether.js.gz (1793 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/security.js.gz (962 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/vlan.js.gz (959 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ssid.js.gz (4151 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/1/dot1x.js.gz (988 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/network-if.js.gz (2084 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/stp.js.gz (957 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_assoc.shtml.gz (5614 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_event-log.shtml.gz (3907 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_home.shtml.gz (6972 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_network-if.shtml.gz (3565 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_network-map.shtml.gz (3880 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_services.shtml.gz (3697 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_system-sw.shtml.gz (2888 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/ap_contextmgr.shtml.gz (3706 bytes)

c1140-k9w7-mx.152-2.JB/html/level/1/images/ (directory) 0 (bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/ap_title_appname.gif (2042 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/c1040_title_appname.gif (2058 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button.gif (1211 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_1st.gif (1171 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_cbottom.gif (318 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_current.gif (1206 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_endcap.gif (878 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_encap_last.gif (333 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_last.gif (386 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_button_nth.gif (1177 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_dkgreen.gif (869 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_green.gif (879 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_upright.gif (64 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/apps_leftnav_yellow.gif (881 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/arrowdown_red.gif (108 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/arrowup_green.gif (108 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/corner_ur_7.gif (53 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/dkgreenmask11_up.gif (113 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/dkgreenmask28_upright.gif (110 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/grn_vertlines_bottom.gif (149 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/grn_vertlines_top.gif (141 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/hinav_plus.gif (56 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/left_bkg.gif (146 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/list_data.gif (122 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/logo.gif (29454 bytes)......

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/pixel.gif (49 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_downleft.gif (53 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_help_off.gif (934 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_help_on.gif (934 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_print_off.gif (111 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/sitewide_print_on.gif (111 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/spacer.gif (49 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/whitemask11_botleft.gif (62 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/whitemask11_upright.gif (61 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_alert.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_critical.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_debugging.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_emergency.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_error.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_information.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_notification.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/event_warning.gif (73 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/check_mark.gif (71 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/background_web41.jpg (732 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/cisco-logo-2012.gif (579 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/1/images/logout_image.gif (40294 bytes)........

c1140-k9w7-mx.152-2.JB/html/level/15/ (directory) 0 (bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_assoc_adv.shtml.gz (4133 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_event-log_config-options.shtml.gz (5651 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_event-log_notif-options.shtml.gz (2683 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_express-setup.shtml.gz (11835 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_express-security.shtml.gz (13539 bytes)...

extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_broadcast-ssid.shtml.gz (1263 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_no-security.shtml.gz (1582 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_eap-security.shtml.gz (1791 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_wep-security.shtml.gz (1597 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/def_wpa-security.shtml.gz (1854 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ipaddress.shtml.gz (4594 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11.shtml.gz (6308 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_b.shtml.gz (6265 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_c.shtml.gz (26662 bytes).....

extracting c1140-k9w7-mx.152-2.JB/html/level/15/dBm_mW_translation_table.shtml.gz (1511 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_802-11_d.shtml.gz (4059 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ethernet.shtml.gz (4340 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-if_ethernet_b.shtml.gz (5488 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz (3795 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec.shtml.gz (7307 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security.shtml.gz (26298 bytes).....

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-key-security.shtml.gz (12303 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_band_select.shtml.gz (5699 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_local-admin-access.shtml.gz (6978 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_network-security_a.shtml.gz (10182 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_network-security_b.shtml.gz (5594 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs.shtml.gz (5077 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs_b.shtml.gz (8514 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_lrs_c.shtml.gz (6163 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz (4973 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz (5051 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz (4658 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz (3596 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ids_mfp.shtml.gz (3912 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (3642 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-security.shtml.gz (6432 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-certificates.shtml.gz (11155 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz (577 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_arp.shtml.gz (3005 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_cdp.shtml.gz (5112 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_console-telnet.shtml.gz (6811 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_dns.shtml.gz (3575 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters.shtml.gz (5207 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-ip.shtml.gz (8411 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-mac.shtml.gz (3998 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_filters-ether.shtml.gz (3842 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_hot-standby.shtml.gz (5495 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_http.shtml.gz (5977 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-b.shtml.gz (6656 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-c.shtml.gz (4153 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip-d.shtml.gz (5159 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_mobile-ip.shtml.gz (6007 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos-traffic.shtml.gz (8125 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos.shtml.gz (12165 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_qos_adv.shtml.gz (4433 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_voice.shtml.gz (4079 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_voice-traffic.shtml.gz (6347 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_snmp.shtml.gz (8002 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_sntp.shtml.gz (5948 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_vlan.shtml.gz (12780 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_services_stp.shtml.gz (7107 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_stationview-client_ltest.shtml.gz (5514 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade-b.htm (231 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6196 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade.htm (229 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade.shtml.gz (6238 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/banner.html (9573 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameAssociation.html (628 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameEventlog.html (627 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameHome.html (611 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameNetWork.html (619 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameSecurity.html (637 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameServices.html (651 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameSoftware.html (650 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameWireless.html (626 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/frameset.html (4394 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navAssociation.html (897 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navBar41.css (3605 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navHome.html (1554 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navNetwork.html (3935 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navSecurity.html (2374 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navServices.html (4508 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navSoftware.html (1586 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navWireless.html (1207 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_down.gif (177 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_down2.gif (838 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_right.gif (137 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/arrow_right2.gif (838 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/servicescript41.js.gz (12165 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/sideMenu.js.gz (813 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_easy-setup.shtml.gz (27004 bytes).....

extracting c1140-k9w7-mx.152-2.JB/html/level/15/navEventLog.html (911 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/content41.css (10497 bytes)..

extracting c1140-k9w7-mx.152-2.JB/html/level/15/logout.html (2369 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade_poll.htm (234 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_upgrade_poll.shtml (3596 bytes)

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_system-sw_sysconfig.shtml.gz (7145 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_stationview-client.shtml.gz (5554 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_ap.shtml.gz (4774 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm.shtml.gz (5294 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm-groups.shtml.gz (7511 bytes).

extracting c1140-k9w7-mx.152-2.JB/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5061 bytes).

extracting c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB (9233742 bytes)...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

extracting c1140-k9w7-mx.152-2.JB/8001.img (186220 bytes)........................................

extracting c1140-k9w7-mx.152-2.JB/T2.bin (8080 bytes).

extracting c1140-k9w7-mx.152-2.JB/T5.bin (23836 bytes).....

extracting c1140-k9w7-mx.152-2.JB/info (277 bytes)

extracting info.ver (277 bytes)

Deleting current version: flash:/c1140-rcvk9w8-mx...done.

New software image installed in flash:/c1140-k9w7-mx.152-2.JB

Configuring system to use new image...done.

Requested system reload in progress...download took about 387 seconds

Loading "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB"...##############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################

File "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB" uncompressed and installed, entry point: 0x4000

executing...

enet halted

              Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.

           170 West Tasman Drive

           San Jose, California 95134-1706

Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2012 by Cisco Systems, Inc.

Compiled Tue 11-Dec-12 04:23 by prod_rel_team

Initializing flashfs...

FLASH CHIP:  Numonyx P33

Checking for Over Erased blocks

......................................................................................................................................................................................................................................................

flashfs[3]: found corrupted block[3] (byte 0, sector 0), fixing...

flashfs[3]: found corrupted block[4] (byte 0, sector 0), fixing...

flashfs[3]: 205 files, 13 directories

flashfs[3]: 0 orphaned files, 0 orphaned directories

flashfs[3]: Total bytes: 32126976

flashfs[3]: Bytes used: 15453696

flashfs[3]: Bytes available: 16673280

flashfs[3]: flashfs fsck took 7 seconds.

flashfs[3]: Initialization complete.

flashfs[4]: 0 files, 1 directories

flashfs[4]: 0 orphaned files, 0 orphaned directories

flashfs[4]: Total bytes: 11999232

flashfs[4]: Bytes used: 1024

flashfs[4]: Bytes available: 11998208

flashfs[4]: flashfs fsck took 1 seconds.

flashfs[4]: Initialization complete....done Initializing flashfs.

Radio0  present 8363 8000 90020000 0 90030000 B

Rate table has 80 entries (32 SGI/4 BF variants)

Radio1  present 8363 8000 98020000 0 98030000 0

Ethernet speed is 1000 Mb - FULL duplex

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply

third-party authority to import, export, distribute or use encryption.

Importers, exporters, distributors and users are responsible for

compliance with U.S. and local country laws. By using this product you

agree to comply with applicable laws and regulations. If you are unable

to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to

export@cisco.com.

cisco AIR-AP1142N-A-K9    (PowerPC405ex) processor (revision A0) with 81910K/49152K bytes of memory.

PowerPC405ex CPU at 586Mhz, revision number 0x147E

Last reset from power-on

1 Gigabit Ethernet interface

2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.

Base ethernet MAC Address:

Part Number                          : 73-11451-06

PCA Assembly Number                  : 800-30554-03

PCA Revision Number                  : A0

PCB Serial Number                    :

Top Assembly Part Number             : 800-31273-01

Top Assembly Serial Number           :

Top Revision Number                  : A0

Product/Model Number                 : AIR-LAP1142N-A-K9  

Press RETURN to get started!

*Mar  1 00:00:10.177: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory

*Mar  1 00:00:10.181: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed

*Mar  1 00:00:10.183: *** CRASH_LOG = YES

*Mar  1 00:00:11.941: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0

*Mar  1 00:00:12.825: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1Base Ethernet MAC address: C4:7D:4F:3A:0E:D8

*Mar  1 00:00:13.032: not a autoconfig enabled device!!!

*Mar  1 00:00:14.973: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up

*Mar  1 00:00:15.973: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up

*Mar  1 00:01:01.900: Starting Ethernet promiscuous mode

*Mar  1 00:01:02.034: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down

*Mar  1 00:01:02.034: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down

*Mar  1 00:01:02.051: %SYS-5-RESTART: System restarted --

Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2012 by Cisco Systems, Inc.

Compiled Tue 11-Dec-12 04:23 by prod_rel_team

*Mar  1 00:01:02.051: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold start

*Mar  1 00:01:03.027: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up

*Mar  1 00:01:03.034: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

*Mar  1 00:01:03.034: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down

*Mar  1 00:01:15.338: %CDP_PD-4-POWER_OK: Full power - INJECTOR_CONFIGURED_ON_SOURCE inline power source

using  eeprom values

WRDTR,CLKTR: 0x84000800 0x40000000

RQDC ,RFDC : 0x8000003a 0x00000210

ddr init done

IOS Bootloader - Starting system.

Xmodem file system is available.

DDR values used from system serial eeprom.

WRDTR,CLKTR: 0x84000800, 0x40000000

RQDC, RFDC : 0x8000003a, 0x00000210

PCIE0: link is up.

PCIE0: VC0 is active

PCIE1: link is up.

PCIE1: VC0 is active

PCIEx: initialization done

flashfs[0]: 205 files, 13 directories

flashfs[0]: 0 orphaned files, 0 orphaned directories

flashfs[0]: Total bytes: 32385024

flashfs[0]: Bytes used: 15454720

flashfs[0]: Bytes available: 16930304

flashfs[0]: flashfs fsck took 25 seconds.

Reading cookie from system serial eeprom...Done

Base Ethernet MAC address: c4:7d:4f:3a:0e:d8

Ethernet speed is 1000 Mb - FULL duplex

Loading "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB"...##############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################

File "flash:/c1140-k9w7-mx.152-2.JB/c1140-k9w7-mx.152-2.JB" uncompressed and installed, entry point: 0x4000

executing...

enet halted

              Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.

           170 West Tasman Drive

           San Jose, California 95134-1706

Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2012 by Cisco Systems, Inc.

Compiled Tue 11-Dec-12 04:23 by prod_rel_team

Initializing flashfs...

FLASH CHIP:  Numonyx P33

Checking for Over Erased blocks

......................................................................................................................................................................................................................................................

flashfs[3]: 205 files, 13 directories

flashfs[3]: 0 orphaned files, 0 orphaned directories

flashfs[3]: Total bytes: 32126976

flashfs[3]: Bytes used: 15454720

flashfs[3]: Bytes available: 16672256

flashfs[3]: flashfs fsck took 6 seconds.

flashfs[3]: Initialization complete.

flashfs[4]: 0 files, 1 directories

flashfs[4]: 0 orphaned files, 0 orphaned directories

flashfs[4]: Total bytes: 11999232

flashfs[4]: Bytes used: 1024

flashfs[4]: Bytes available: 11998208

flashfs[4]: flashfs fsck took 1 seconds.

flashfs[4]: Initialization complete....done Initializing flashfs.

Radio0  present 8363 8000 90020000 0 90030000 B

Rate table has 80 entries (32 SGI/4 BF variants)

Radio1  present 8363 8000 98020000 0 98030000 0

Ethernet speed is 1000 Mb - FULL duplex

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply

third-party authority to import, export, distribute or use encryption.

Importers, exporters, distributors and users are responsible for

compliance with U.S. and local country laws. By using this product you

agree to comply with applicable laws and regulations. If you are unable

to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to

export@cisco.com.

cisco AIR-AP1142N-A-K9    (PowerPC405ex) processor (revision A0) with 81910K/49152K bytes of memory.

Processor board ID

PowerPC405ex CPU at 586Mhz, revision number 0x147E

Last reset from power-on

1 Gigabit Ethernet interface

2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.

Base ethernet MAC Address

Part Number                          :

PCA Assembly Number                  : 800-30554-03

PCA Revision Number                  : A0

PCB Serial Number                    :

Top Assembly Part Number             : 800-31273-01

Top Assembly Serial Number          

Top Revision Number                  : A0

Product/Model Number                 : AIR-LAP1142N-A-K9  

Press RETURN to get started!

*Mar  1 00:00:08.849: %IFMGR-7-NO_IFINDEX_FILE: Unable to open nvram:/ifIndex-table No such file or directory

*Mar  1 00:00:08.853: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed

*Mar  1 00:00:08.854: *** CRASH_LOG = YES

*Mar  1 00:00:10.613: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0

*Mar  1 00:00:11.497: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1Base Ethernet MAC address: C4:7D:4F:3A:0E:D8

*Mar  1 00:00:11.703: not a autoconfig enabled device!!!

*Mar  1 00:00:13.644: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up

*Mar  1 00:00:14.644: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up

*Mar  1 00:01:00.572: Starting Ethernet promiscuous mode

*Mar  1 00:01:00.707: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down

*Mar  1 00:01:00.707: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down

*Mar  1 00:01:00.722: %SYS-5-RESTART: System restarted --

Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport

Copyright (c) 1986-2012 by Cisco Systems, Inc.

Compiled Tue 11-Dec-12 04:23 by prod_rel_team

*Mar  1 00:01:00.722: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold start

*Mar  1 00:01:01.698: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up

*Mar  1 00:01:01.707: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

*Mar  1 00:01:01.707: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down

*Mar  1 00:01:13.444: %CDP_PD-4-POWER_OK: Full power - INJECTOR_CONFIGURED_ON_SOURCE inline power source

===================================================

You can see the output so you should be able to hit the CLI.

Sent from Cisco Technical Support iPhone App

-Scott
*** Please rate helpful posts ***

venkateshjaya
Level 1
Level 1

hi

Did notice a similar output and ending with same output using secureCRT terminal client.

But when switched to a teraterm, it worked and console responded to key input.

HTH

Abhishek Abhishek
Cisco Employee
Cisco Employee

Here’s a quick walk through to get a Cisco AP – in my case an 1130AG – from a controller based  LWAPP image back to the autonomous image so it can be used as a standalone AP again.

Retrieve the latest IOS image for your AP from Cisco.com
Retreive TFTPD for use as your TFTP server from here
You’ll need a PC with a static IP (10.0.0.1/24 for this example) to wire your AP straight into during the procedure, with the TFTP server running, all firewalls disabled and the IOS image available in the TFTP root.

Step 1: Make sure that the PC contains the access point image file (such as c1130-k9w7-tar.124-10b.JDA3.tar for an 1130 series access point) in the TFTP server folder and that the TFTP server is activated.

Step 2: Set the timeout value on the TFTP server to 30 seconds.

Step 3: On the PC where the TFTP server is located, perform these steps:

a. Disable any software firewall products, such as Windows firewall, ZoneAlarm firewall, McAffee firewall, or others.

b. Ensure all Windows files are visible. From Windows Explorer, click Tools > Folder Options > View; then uncheck the Hide extensions for known file types check box.

Step 4: Connect the PC to the access point using a Category 5 Ethernet cable.

Step 5: Disconnect power from the access point.

Step 6: Press and hold MODE while you reconnect power to the access point.

Step 7: Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds) and then release.

Step 8: Enable LWAPP console CLI allow/disallow debugging

#debug lwapp con cli

Step 9: Enable LWAPP ignore internal reload debugging

#debug lwapp client no-reload

Step 10: Configure IP Address on the fast ethernet interface of the AP

#conf t
(config)#interface fa0
(config-if)#ip addr 10.0.0.2 255.255.255.0

Step 11: Download the image file from the TFTP server to the AP

#archive download-sw /overwrite tftp://10.0.0.1/c1130-k9w7-tar.124-10b.JDA3.tar

Step 12: Reload the unit once the image has been written and the process reports complete.

#reload.

You’ll now be running an autonomous image which you can work with.

dapot.simarmata
Level 1
Level 1

Hi,

It should be uploaded with the autonomous AP.

The console just doesn't response to your key input. Try to uncheck the RTS/CTS Flow Control on your SecureCRT Serial Session.

Tks

Review Cisco Networking for a $25 gift card