cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
287195
Views
101
Helpful
24
Comments
Surendra BG
Cisco Employee
Cisco Employee

 

 

 

Introduction

 

Here is the step by step process that we have to take care of while converting LWAPP to IOS and then vice versa..

 

LWAPP to IOS

 

 

The hardware used = 1141 AP (make sure we are using the right image)

 

c1140-k9w7-tar.124-21a.JY.tar not c1140-rcvk9w8-tar.124-23c.JA.tar

 

I request you to do download any image from the below link and perform the conversion from LWAPP image to autonomous..

 

http://tools.cisco.com/support/downloads/go/PlatformList.x?sftType=IOS+Software&mdfid=282439881&treeName=Wireless&mdfLevel=Model&url=null&modelName=Cisco+Aironet+1140+Access+Point&isPlatform=N&treeMdfId=278875243&modifmdfid=null&imname=&hybrid=Y&imst...

 

the methods to convert is..

 

download TFTPd32 from Google and install it on ur PC.. point the image that you have downloaded in the TFTP server..

 

connect    a Ethernet cable between ur laptop and AP.. both should be in the  same   subnet.. and connect a console cable and get the hyperterminal  console   access and issue the command.. make sure you are able to ping  the PC  and the AP and vice versa!!

 

AP>en

AP#debug lwapp console cli or debug capwap console cli

AP#config t

AP(confg)int fa 0

AP(confg-if)ip addr <addr> <mask> (same subnet as that of the laptop)

AP(confg-if)end

AP#archive download-sw /force-reload /overwrite tftp://<tftp ip address>/<image name.tar>

 

AP#archieve download-sw /force-reload /overwrite tftp://10.0.0.5/c1140-k9w7-tar.124-21a.JY.tar

 

The above command will do it for you!!

 

IOS TO LWAPP

 

Now to reconvert the AP back to LWAPP..

 

Download the LWAPP image(W8) from the Cisco website and get the console access the AP and just issue the command..

 

archive download-sw/overwrite/force-reload tftp://<IP address of the  TFTP server>//<image>

 

AP#archive download-sw /force-reload /overwrite tftp://10.0.0.5/c1140-rcvk9w8-tar.124-23c.JA.tar

 

I assume we have the TFTPd32 downloaded from Google and in the TFTPd32 pointing to the image.

 

Reference Video

 

LWAPP to Auto.bmp

For 1100 series APs

 

 

here is the link which will help you..

 

http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html

 

 

Thats it!!

Comments
Vinay Sharma
Level 7
Level 7

Hi Surendra,

thanks for the useful information. Not sure why it is not rated till now. rating it so that other can take advantage of this useful info.

Vinay

mike-stevenson
Level 1
Level 1

Isn't this completely wrong,? you are using a 1231, which does not have MIC installed, so you MUST use the upgrade tool (so that the SSC is generated). 

This is shown in your video, where the console messages on the AP complains about no SSC so can not join the controller. 

The downgrade process, that you have shown, shows the downgrade from the rcv image, not a full LWAPP image, so is also incorrect ie. you are not downgrading from the LWAPP image as the video states, but from the recovery image. As far as i understand you cannot go into config mode on a full LWAPP image, all config changes must be done from the WLC?

Surendra BG
Cisco Employee
Cisco Employee

Hi Mike,

Thanks for the comment!!

This Document is more of Converting the AP from LWAPP to IOS and vice versa!! So i think AP registering to WLC is a completely different thing!!

Regarding the LWAPP image, the LWAPP image that we have on CCO all are RCK images.. when the AP registers to the WLC, again the code will be downloaded.. even then we can convert the by going into the config terminal!! I guess u missed the hidden debug command which allows us to do it!! i am pretty syre that we can convert coz i have done this countless times in my lab!!

Lemme know if you are not able to convert, i will help you out in getting the LWAPP converted to IOS.

Surendra BG
Cisco Employee
Cisco Employee

This hidden command will help us in getting into config mode on any LWAPP AP..

AP#debug lwapp console cli or debug capwap console cli

Please try on ur device and let me know if u face any kinda issue, i will help u out!!

Regards

Surendra

mike-stevenson
Level 1
Level 1

Awesome, I did miss that!! many thanks for this, it will be very useful.

cheers

Vinay Sharma
Level 7
Level 7

Mike,

As surendra mentioned, this has been tested Many times and works fine :-).

thanks for your Input.

Vinay

jarrod sousa
Level 1
Level 1

OK i know this is an old post, but i need some help.  i have a 1142N that is currently in LWAP mode.  i did the factory reset (had to reset the admin password) and am unable to follow the steps listed above.  below is the sh run output and screen shot from the debug command error.  i am able to ping my laptop running the TFTP server @ 192.168.10.11.  thanks!

!

interface GigabitEthernet0

ip address dhcp client-id GigabitEthernet0

no ip route-cache

duplex auto

speed auto

no keepalive

no cdp enable

!

no cdp run

!

line con 0

line vty 0 4

login

line vty 5 15

login

!

end

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#ping 192.168.10.1

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms

AP0022.bd1a.ad47#$ite tftp://192.168.10.11/c1140-k9w7-tar.124-25d.JA1.tar

archive download-sw /force-reload /overwrite tftp://192.168.10.11/c1140-k9w7-tar^.124-25d.JA1.t                                                                                                      ar

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#archive download-sw /force-reload /overwrite tftp://192.168.1$

archive download-sw /force-reload /overwrite tftp://192.168.10.11/c1140-k9w7-tar^.124-25d.JA1.tar

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#archive down

AP0022.bd1a.ad47#archive download

AP0022.bd1a.ad47#$nload-sw /force-reload /overwrite tftp://192.168.10.11

archive download-sw /force-reload /overwrite tftp://192.168.10.11

^

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#ping 192.168.10.11

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 192.168.10.11, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/202/1001 ms

AP0022.bd1a.ad47#

sh run

Building configuration...

Current configuration : 16823 bytes

!

version 12.4

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

service password-encryption

!

hostname AP0022.bd1a.ad47

!

enable secret 5 $1$8Qif$WHvLY6alYp3t8tebvjsF01

!

power inline negotiation prestandard source

!

crypto pki trustpoint Cisco_IOS_MIC_cert

revocation-check none

rsakeypair Cisco_IOS_MIC_Keys

!

crypto pki trustpoint cisco-root-cert

revocation-check none

rsakeypair Cisco_IOS_MIC_Keys

!

crypto pki trustpoint airespace-device-root-cert

revocation-check none

rsakeypair Cisco_IOS_MIC_Keys

!

crypto pki trustpoint airespace-new-root-cert

revocation-check none

rsakeypair Cisco_IOS_MIC_Keys

!

crypto pki trustpoint airespace-old-root-cert

revocation-check none

rsakeypair Cisco_IOS_MIC_Keys

!

!

crypto pki certificate chain Cisco_IOS_MIC_cert

certificate 77A4CA0A00000011C7EA

  30820470 30820358 A0030201 02020A77 A4CA0A00 000011C7 EA300D06 092A8648

  86F70D01 01050500 30393116 30140603 55040A13 0D436973 636F2053 79737465

  6D73311F 301D0603 55040313 16436973 636F204D 616E7566 61637475 72696E67

  20434130 1E170D30 39303832 33303332 3332345A 170D3139 30383233 30333333

  32345A30 818C310B 30090603 55040613 02555331 13301106 03550408 130A4361

  6C69666F 726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406

  0355040A 130D4369 73636F20 53797374 656D7331 1B301906 03550403 13124331

  3134302D 30303232 62643161 61643437 3120301E 06092A86 4886F70D 01090116

  11737570 706F7274 40636973 636F2E63 6F6D3082 0122300D 06092A86 4886F70D

  01010105 00038201 0F003082 010A0282 010100B5 0FAC46CF A5EFD6B0 82AB921D

  45723F64 8AB6B752 D9741C99 4B19D6C4 D101B97A A35CCDD9 4F1FF067 FB202EA4

  F62CDAAC 05C8A0C2 7F35C3B6 5C6C6CF1 688F6E41 80D7A735 668AAEB5 7F1638D2

  33508851 D21CE815 D161CC49 4C792E00 D1B47A3D 9AE78643 4C14BD7F 4D926502

  BEF680AF 185C020F 7420839F 512A8996 DC954B25 22A72C52 9ADC1B99 D07EC487

  6BA08179 289DEE96 98D6C78A 120458A2 67FA6001 B68D2775 CF85F245 D432DD75

  42E5689F 1776BA5B A940AFCD FEF3F6DF F1E32579 D9FE3698 6E9BC555 88407D63

  65BFDDCE 21542681 8232F5BA 883296D4 93D050A2 5DF87929 F53CED6C 9158C886

  E21BCA3E D979A804 A8BC552D 6EDDD1F8 91F22902 03010001 A3820124 30820120

  300E0603 551D0F01 01FF0404 030205A0 301D0603 551D0E04 16041498 3DA0EA59

  A85CC59A 8B186322 BDF9108E FDA79B30 1F060355 1D230418 30168014 D0C52226

  AB4F4660 ECAE0591 C7DC5AD1 B047F76C 303F0603 551D1F04 38303630 34A032A0

  30862E68 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 72697479

  2F706B69 2F63726C 2F636D63 612E6372 6C304C06 082B0601 05050701 01044030

  3E303C06 082B0601 05050730 02863068 7474703A 2F2F7777 772E6369 73636F2E

  636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 6D63612E 63657230

  3F06092B 06010401 82371402 04321E30 00490050 00530045 00430049 006E0074

  00650072 006D0065 00640069 00610074 0065004F 00660066 006C0069 006E0065

  300D0609 2A864886 F70D0101 05050003 82010100 47ABAE46 D2CA25E3 6FEB0034

  887181E5 DE487C2C 23572454 CFEC0DE5 C649474F 6A84DDF4 EA58DCD7 CA24AF26

  03D00A9D 0323DCB4 B3BCD04D DD54983C 958DD3EF B13A9BFB 86A758C6 2863E627

  250404A9 D61882EB B0E660E6 8A0C3DEE 3575CFFA 3C3330F4 6904B40B BFF73E61

  14DDE2F2 9B87FE9D 24D9B095 FBD9411E 5FDC9C9F 6E038A87 3D832D47 4139C7EA

  A74D3335 F15EC1E6 F91E854F 5612C037 91CE1841 36430FD0 FAC3DEE8 80E678BE

  FD098252 A57EEFE3 CB222207 C5C3A034 F86EA69B 7551CE5C E419393B 23C4EFFD

  1338FCA9 3045CD09 E3A6D9A1 F0EDC885 28E969CB AF010166 CED2F493 4131A7A3

  9A588AF3 A5F33120 DCF8E99A 66A6E3BA FD842286

  quit

certificate ca 6A6967B3000000000003

  308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648

  86F70D01 01050500 30353116 30140603 55040A13 0D436973 636F2053 79737465

  6D73311B 30190603 55040313 12436973 636F2052 6F6F7420 43412032 30343830

  1E170D30 35303631 30323231 3630315A 170D3239 30353134 32303235 34325A30

  39311630 14060355 040A130D 43697363 6F205379 7374656D 73311F30 1D060355

  04031316 43697363 6F204D61 6E756661 63747572 696E6720 43413082 0120300D

  06092A86 4886F70D 01010105 00038201 0D003082 01080282 010100A0 C5F7DC96

  943515F1 F4994EBB 9B41E17D DB791691 BBF354F2 414A9432 6262C923 F79AE7BB

  9B79E807 294E30F5 AE1BC521 5646B0F8 F4E68E81 B816CCA8 9B85D242 81DB7CCB

  94A91161 121C5CEA 33201C9A 16A77DDB 99066AE2 36AFECF8 0AFF9867 07F430EE

  A5F8881A AAE8C73C 1CCEEE48 FDCD5C37 F186939E 3D71757D 34EE4B14 A9C0297B

  0510EF87 9E693130 F548363F D8ABCE15 E2E8589F 3E627104 8726A415 620125AA

  D5DFC9C9 5BB8C9A1 077BBE68 92939320 A86CBD15 75D3445D 454BECA8 DA60C7D8

  C8D5C8ED 41E1F55F 578E5332 9349D5D9 0FF836AA 07C43241 C5A7AF1D 19FFF673

  99395A73 67621334 0D1F5E95 70526417 06EC535C 5CDB6AEA 35004102 0103A382

  01E73082 01E33012 0603551D 130101FF 04083006 0101FF02 0100301D 0603551D

  0E041604 14D0C522 26AB4F46 60ECAE05 91C7DC5A D1B047F7 6C300B06 03551D0F

  04040302 01863010 06092B06 01040182 37150104 03020100 30190609 2B060104

  01823714 02040C1E 0A005300 75006200 43004130 1F060355 1D230418 30168014

  27F3C815 1E6E9A02 0916AD2B A089605F DA7B2FAA 30430603 551D1F04 3C303A30

  38A036A0 34863268 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375

  72697479 2F706B69 2F63726C 2F637263 61323034 382E6372 6C305006 082B0601

  05050701 01044430 42304006 082B0601 05050730 02863468 7474703A 2F2F7777

  772E6369 73636F2E 636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63

  72636132 3034382E 63657230 5C060355 1D200455 30533051 060A2B06 01040109

  15010200 30433041 06082B06 01050507 02011635 68747470 3A2F2F77 77772E63

  6973636F 2E636F6D 2F736563 75726974 792F706B 692F706F 6C696369 65732F69

  6E646578 2E68746D 6C305E06 03551D25 04573055 06082B06 01050507 03010608

  2B060105 05070302 06082B06 01050507 03050608 2B060105 05070306 06082B06

  01050507 0307060A 2B060104 0182370A 0301060A 2B060104 01823714 02010609

  2B060104 01823715 06300D06 092A8648 86F70D01 01050500 03820101 0030F330

  2D8CF2CA 374A6499 24290AF2 86AA42D5 23E8A2EA 2B6F6923 7A828E1C 4C09CFA4

  4FAB842F 37E96560 D19AC6D8 F30BF5DE D027005C 6F1D91BD D14E5851 1DC9E3F7

  38E7D30B D168BE8E 22A54B06 E1E6A4AA 337D1A75 BA26F370 C66100A5 C379265B

  A719D193 8DAB9B10 11291FA1 82FDFD3C 4B6E65DC 934505E9 AF336B67 23070686

  22DAEBDC 87CF5921 421AE9CF 707588E0 243D5D7D 4E963880 97D56FF0 9B71D8BA

  6019A5B0 6186ADDD 6566F6B9 27A2EE2F 619BBAA1 3061FDBE AC3514F9 B82D9706

  AFC3EF6D CC3D3CEB 95E981D3 8A5EB6CE FA79A46B D7A25764 C43F4CC9 DBE882EC

  0166D410 88A256E5 3C57EDE9 02A84891 6307AB61 264B1A13 9FE4DCDA 5F

  quit

crypto pki certificate chain cisco-root-cert

certificate ca 5FF87B282B54DC8D42A315B568C9ADFF

  30820343 3082022B A0030201 0202105F F87B282B 54DC8D42 A315B568 C9ADFF30

  0D06092A 864886F7 0D010105 05003035 31163014 06035504 0A130D43 6973636F

  20537973 74656D73 311B3019 06035504 03131243 6973636F 20526F6F 74204341

  20323034 38301E17 0D303430 35313432 30313731 325A170D 32393035 31343230

  32353432 5A303531 16301406 0355040A 130D4369 73636F20 53797374 656D7331

  1B301906 03550403 13124369 73636F20 526F6F74 20434120 32303438 30820120

  300D0609 2A864886 F70D0101 01050003 82010D00 30820108 02820101 00B09AB9

  ABA7AF0A 77A7E271 B6B46662 94788847 C6625584 4032BFC0 AB2EA51C 71D6BC6E

  7BA8AABA 6ED21588 48459DA2 FC83D0CC B98CE026 68704A78 DF21179E F46105C9

  15C8CF16 DA356189 9443A884 A8319878 9BB94E6F 2C53126C CD1DAD2B 24BB31C4

  2BFF8344 6FB63D24 7709EABF 2AA81F6A 56F6200F 11549781 75A725CE 596A8265

  EFB7EAE7 E28D758B 6EF2DD4F A65E629C CF100A64 D04E6DCE 2BCC5BF5 60A52747

  8D69F47F CE1B70DE 701B20D6 6ECDA601 A83C12D2 A93FA06B 5EBB8E20 8B7A91E3

  B568EEA0 E7C40174 A8530B2B 4A9A0F65 120E824D 8E63FDEF EB9B1ADB 53A61360

  AFC27DD7 C76C1725 D473FB47 64508180 944CE1BF AE4B1CDF 92ED2E05 DF020103

  A351304F 300B0603 551D0F04 04030201 86300F06 03551D13 0101FF04 05300301

  01FF301D 0603551D 0E041604 1427F3C8 151E6E9A 020916AD 2BA08960 5FDA7B2F

  AA301006 092B0601 04018237 15010403 02010030 0D06092A 864886F7 0D010105

  05000382 0101009D 9D8484A3 41A97C77 0CB753CA 4E445062 EF547CD3 75171CE8

  E0C6484B B6FE4C3A 198156B0 56EE1996 62AA5AA3 64C1F64E 5433C677 FEC51CBA

  E55D25CA F5F0939A 83112EE6 CBF87445 FEE705B8 ABE7DFCB 4BE13784 DAB98B97

  701EF0E2 8BD7B0D8 0E9DB169 D62A917B A9494F7E E68E95D8 83273CD5 68490ED4

  9DF62EEB A7BEEB30 A4AC1F44 FC95AB33 06FB7D60 0ADEB48A 63B09CA9 F2A4B953

  0187D068 A4277FAB FFE9FAC9 40388867 B439C684 6F57C953 DBBA8EEE C043B2F8

  09836EFF 66CF3EEF 17B35818 2509345E E3CBD614 B6ECF292 6F74E42F 812AD592

  91E0E097 3C326805 854BD1F7 57E2521D 931A549F 0570C04A 71601E43 0B601EFE

  A3CE8119 E10B35

  quit

crypto pki certificate chain airespace-device-root-cert

certificate ca 03

  3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030

  81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F

  726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A

  130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E

  65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420

  43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573

  70616365 2E636F6D 301E170D 30353034 32383232 33373133 5A170D31 35303132

  36323233 3731335A 3081A831 0B300906 03550406 13025553 31133011 06035504

  08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365

  31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355

  040B130B 456E6769 6E656572 696E6731 1C301A06 03550403 13134169 72657370

  61636520 44657669 63652043 41312430 2206092A 864886F7 0D010901 16157375

  70706F72 74406169 72657370 6163652E 636F6D30 81DF300D 06092A86 4886F70D

  01010105 000381CD 003081C9 0281C100 A93C0158 E7284E75 FF86A57A 886ACA37

  430BECF0 7582F56B DB6AC514 554FB06E AA327B3E CE3C9391 03C93BA4 0C0AF932

  A6CB5DA3 F1C3C528 53BF4E19 2C1BFC48 467EBD93 06B4974A 1273BF35 8AD8540F

  261E612B A2673B68 D239C87E 1E9E967B 2654D285 45BB7F78 5F4E9D4B 7B8001AA

  2F455CFF 4552ECDB 5667E3FC E7093E06 8FAE353D 4228B48D 8B415D9B F496342D

  C1459987 B69BFA4B 51FB67B4 A0C21E7F C6269A39 47EB1D48 5E83B129 8B079E5E

  1EDAB5A0 BE5E1DE0 109FF0BD 4750E32B 02030100 01A38201 37308201 33300C06

  03551D13 04053003 0101FF30 2E060960 86480186 F842010D 0421161F 41697265

  73706163 65204465 76696365 20434120 43657274 69666963 61746530 1D060355

  1D0E0416 04140A52 3BB12570 523B9CEA 747FB2AD 3D8F95EA 3FCC3081 D3060355

  1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181

  ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43

  616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015

  06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B

  456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520

  526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440

  61697265 73706163 652E636F 6D820100 300D0609 2A864886 F70D0101 04050003

  81C100A0 E8D59D9B DA9EED0C 96045DFE A37084EC 59B5C3D3 71694DB0 70664E0C

  8060D69E E366E81F 9F3CCF68 8AB0498E CCFA6CA7 2854F2D8 046690C9 8FEC84EF

  2F7F0F08 C90F719D C0F4C125 CED1B525 6DD93E51 777BD5E8 7F1DC79F CC502DC2

  0242C05D 1682DEE3 DF7541B8 C55B433C 10DFE2BF D2E802E7 D923329A 23A2076F

  86BCC048 D569B383 59AC8979 97F02C55 6F8FE318 754F605C 43CDA7C8 1847B085

  1DADF0D6 CD62C8DE A86E6E12 4A7CDCBF A6FCC7E1 852A1DB1 529D63B3 688305F6 7BD25F

  quit

crypto pki certificate chain airespace-new-root-cert

certificate ca 00

  3082045A 30820383 A0030201 02020100 300D0609 2A864886 F70D0101 04050030

  81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F

  726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A

  130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E

  65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420

  43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573

  70616365 2E636F6D 301E170D 30333037 33313133 34313232 5A170D31 33303432

  39313334 3132325A 3081A631 0B300906 03550406 13025553 31133011 06035504

  08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365

  31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355

  040B130B 456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370

  61636520 526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070

  6F727440 61697265 73706163 652E636F 6D3081DF 300D0609 2A864886 F70D0101

  01050003 81CD0030 81C90281 C100CCA0 F92330BD 49E947A4 3FA2ACF3 A4827F66

  77BB66F4 6B1636BA 84EF0966 9CCAE0EA CA6F1D0F BA90FEFA 58B8502C 10FC78DC

  C9D126D8 8F2AD059 A8A69BFE 90324BD6 4553CED9 131B99B0 282A73D9 8655EFAF

  5EA54096 22E54B9F C4258988 78F1A51F F47B16F2 0C0A37A3 52603A5A B0DC4533

  B0C0B7C8 02DF25F0 585DFF5F 43FDAE1F 48A34BDF F80AC27E 30BE931B D3490ADE

  C81FF6F9 974F1408 55C8813F D334F1B8 A1892B0A 10D98A44 7DBF213E 64520D20

  E78E9322 DA11CA7A 46ACEB41 46AB0203 010001A3 82011430 82011030 1D060355

  1D0E0416 0414538D 8360478D C20F8066 3232E9E1 7070552B 17EA3081 D3060355

  1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181

  ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43

  616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015

  06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B

  456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520

  526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440

  61697265 73706163 652E636F 6D820100 300C0603 551D1304 05300301 01FF300B

  0603551D 0F040403 02010630 0D06092A 864886F7 0D010104 05000381 C10006E3

  653D4B19 FAA0C3B9 8EAE23C5 A3305E42 4522A961 BE1B5B88 56ED2E5A E42F7AC0

  26AA2805 9824080D 1512169B 44E42847 2EBBA573 29F070DB 56011C7B E9F3A240

  399A3557 A50384EC A0353DCF 49E8EC01 94047469 0BC12079 2764873D 25943DCD

  66A9726F 4A79EB40 1C7C6897 4E925D80 2313C126 1F604763 A9D9AC1F DF0092F6

  57DF1AB4 9B904E22 CE5515CD 44F68A00 4E2BC861 FBC1540D C1F3A66B 8CDDC1C2

  7C442027 E6241198 B0E002DE 9E06D64F 0D538987 96C1C0DB 12B0F581 6FED

  quit

crypto pki certificate chain airespace-old-root-cert

certificate ca 00

  30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030

  818F310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F

  726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 0355040A

  130D6169 72657370 61636520 496E6331 0D300B06 0355040B 13046E6F 6E65310B

  30090603 55040313 02636131 24302206 092A8648 86F70D01 09011615 73757070

  6F727440 61697265 73706163 652E636F 6D301E17 0D303330 32313232 33333835

  355A170D 31323131 31313233 33383535 5A30818F 310B3009 06035504 06130255

  53311330 11060355 0408130A 43616C69 666F726E 69613111 300F0603 55040713

  0853616E 204A6F73 65311630 14060355 040A130D 61697265 73706163 6520496E

  63310D30 0B060355 040B1304 6E6F6E65 310B3009 06035504 03130263 61312430

  2206092A 864886F7 0D010901 16157375 70706F72 74406169 72657370 6163652E

  636F6D30 81DF300D 06092A86 4886F70D 01010105 000381CD 003081C9 0281C100

  DB9D3901 30059DD1 05CB2793 9B9907F8 1FF57FA9 24065BF7 1A5865F8 B9CFCCB3

  679354D4 69BAB847 1CA327AE EA006AAC 90479C9D C23B67DE FACC0D28 32C6103F

  A59C41E2 E8B4250B 4D2903EB 52629A99 D618B747 C4A94151 1AB995BB 14905404

  5F4A0B9F F387F346 D5F3A249 2AED1B6A 3DD639D8 4924366A 1234DD2D B13CD489

  7E2EA101 63BCCC82 2F7A6D0B 33AB5705 3C784A6D A3DD1E5B 96CF54C6 CF4D59BC

  1BFD6CB6 E72FCB29 88DCBE6D 4D76FB83 1FAF5683 E4E20822 00A9EB2E 3BEF0DF9

  02030100 01A381EF 3081EC30 1D060355 1D0E0416 04149457 DF7D1482 2D31BB28

  772E8996 1886DA46 84BA3081 BC060355 1D230481 B43081B1 80149457 DF7D1482

  2D31BB28 772E8996 1886DA46 84BAA181 95A48192 30818F31 0B300906 03550406

  13025553 31133011 06035504 08130A43 616C6966 6F726E69 61311130 0F060355

  04071308 53616E20 4A6F7365 31163014 06035504 0A130D61 69726573 70616365

  20496E63 310D300B 06035504 0B13046E 6F6E6531 0B300906 03550403 13026361

  31243022 06092A86 4886F70D 01090116 15737570 706F7274 40616972 65737061

  63652E63 6F6D8201 00300C06 03551D13 04053003 0101FF30 0D06092A 864886F7

  0D010104 05000381 C100AEB0 349DC0F9 2AAA3A57 75B3A79C 5421A9D0 15389261

  95C03479 04DA81D4 120F58FA E2299223 BEB54A90 6D70F7F7 2192EFAF A4B0F488

  604E3094 BBCC77A3 60A88129 0849B87B 5CA1AA17 21922A55 6B68E0D3 1ADC7264

  C4C4D6B2 33345C86 254E4988 096645CD 40F12761 8BC37E71 DAD91677 25322361

  71D87A16 F92AF7C1 51CB8892 443BC666 59BEA47B 985E8866 68A1EBD4 88BBF6E7

  A949FDF8 7711D518 A80E203D A12BEBDC 6963EDA7 B76079A3 22380C96 0CB8D324

  CADD949D EA39E0EF 033D

  quit

username Cisco secret 5 $1$Uxfs$tglVZu21Gdw270eIk9Dd61

!

!

!

interface GigabitEthernet0

ip address dhcp client-id GigabitEthernet0

no ip route-cache

duplex auto

speed auto

no keepalive

no cdp enable

!

no cdp run

!

line con 0

line vty 0 4

login

line vty 5 15

login

!

end

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#config t

                  ^

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#debug lwapp console cli or debug capwap console cli

                              ^

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#sh run config

                        ^

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#sh start

startup-config is not present

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#ping 192.168.10.11

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 192.168.10.11, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/6 ms

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#

AP0022.bd1a.ad47#$ite tftp://192.168.10.11/c1140-k9w7-tar.124-25d.JA1.tar

archive download-sw /force-reload /overwrite tftp://192.168.10.11/c1140-k9w7-tar^.124-25d.JA1.tar

% Invalid input detected at '^' marker.

AP0022.bd1a.ad47#

Surendra BG
Cisco Employee
Cisco Employee

Its

debug lwapp console cli (for the APs using LWAPP code)

OR ( meaning Either LWAPP or CAPWAP depending on the required command NOT BOTH)

debug capwap console cli ( for the APs using CAPWAP code)

Try this and this wil help you!!

Regards

Surendra

muresan.andrei
Level 1
Level 1

Hello,

I'm trying to convert an 1262 AP from LWAPP to Autonomous mode, but the commands above are working just for the conversion from Autonomous to LWAPP. I can't issue the debug command, the archive command, I can't even get into the config mode.

Below are some outputs which can offer you a better idea about my problem. Can you tell me if this is something normal? Can I use a CLI command for this conversion or that procedure with the mode button pressed reload is the only option?

RAP01#show version
Cisco IOS Software, C1260 Software (AP3G1-RCVK9W8-M), Version 12.4(23c)JA5, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Mon 30-Apr-12 13:33 by prod_rel_team

ROM: Bootstrap program is C1260 boot loader
BOOTLDR: C1260 Boot Loader (AP3G1-BOOT-M) Version 12.4(23c)JA, RELEASE SOFTWARE (fc3)

RAP01 uptime is 22 minutes
System returned to ROM by reload
System image file is "flash:/ap3g1-rcvk9w8-mx/ap3g1-rcvk9w8-mx"

RAP01#debug capwap ?

  client  CAPWAP Client Debug Options

  mcast   CAPWAP MCAST Debug Options

  mfp     CAPWAP MFP Debug Options

RAP01#c?

capwap  cd  clear  clock

crypto

RAP01#a?

% Unrecognized command

Thank you,

Andrei

mariolara
Community Member

I have tried to download the images of tool.cisco.com, but the page does not work, anyone know where I can get these images

CISCO LWAPP TO AUTONOUMOUS MODE CONFIGURATION:

(HERE WE USED CISCO AIRONET 1131 AG)

1->DELETE THE OLD FLASH FILE FROM THE CISCO WIFI

Connect Ethernet cable and console cable.

  #delete

  -It will ask to delete what , then delete the old flash file

 -NOTE: Now we can only able to get into the router’s recovery mode because we erased old flash

  -EX for recovery mode----à ap:

2->DOWNLOAD THE TFTP32 APPLICATION SOWTWARE(run tftp server on 10.0.0.2/24)

 - Set ip for the pc which we using as 10.0.0.2/24

  -Subnet: 255.255.255.0

  -Default gateway:10.0.0.10

  -Run the tftp to download the IOS image from the working cisco router, follow step (3)

3->DOWNLOAD CORRECT IOS IMAGE FROM THE OTHER USING CISCO ROUTER(SAME 1130 INCASE)    else  in CISCO.COM

       To download ios to tftp:

       NOTE:ALWAYS CONNECT ETHERNET CABLE WITH PC TO WIFI TO TRANSFER IOS

        Log into the working cisco router and follow the below mentioned command to copy ios to tftp

      #archive upload-sw /version c1130-k9w7-mx.124-21a.JY  tftp://10.0.0.2/ c1130-k9w7-mx.124-21a.JA1.tar

        Note: don’t ever forget to give version above command

      -now it will upload the CORRECT  image ios file into TFTP path.

      - when you checked the path in the tftp server it shows the file name as .tar.tar twice at the last

       So simply erase one .tar( Make it with only .tar)

 

 

 

 

4->ENTER  CISCO WIFI ROUTER  THROUGH CLI

       Note: ensure we can only able to work  in the recovery mode (EX: ap)

      ap: tftp_init

      ap: ether_init

      ap: flash_init

      ap: tar -xtract tftp://10.0.0.2/images/c1130-k9w7-mx.124-21a.JA1.tar flash:

     note:don’t ever forget to give /images , else it will prompt the error like (no such  file   directory found)

     now it will extract the image ios into the router

     ap:set

    BOOT=flash:/c1130-k9w7-mx.124-21a.JA1

     Note : don’t give extension as .tar

     NOW

   ap: reset 

    (in ap: mode we use reset for reload , instead of reload in wifi router)

   5->SIMPLY CONFIGURE IP AND GATEWAY TO USE THE ROUTER

 

 

 

 

 

 

 

 

 

CISCO LWAPP TO AUTONOUMOUS MODE CONFIGURATION:

(HERE WE USED CISCO AIRONET 1131 AG)

1->DELETE THE OLD FLASH FILE FROM THE CISCO WIFI

Connect Ethernet cable and console cable.

  #delete

  -It will ask to delete what , then delete the old flash file

 -NOTE: Now we can only able to get into the router’s recovery mode because we erased old flash

  -EX for recovery mode----à ap:

2->DOWNLOAD THE TFTP32 APPLICATION SOWTWARE(run tftp server on 10.0.0.2/24)

 - Set ip for the pc which we using as 10.0.0.2/24

  -Subnet: 255.255.255.0

  -Default gateway:10.0.0.10

  -Run the tftp to download the IOS image from the working cisco router, follow step (3)

3->DOWNLOAD CORRECT IOS IMAGE FROM THE OTHER USING CISCO ROUTER(SAME 1130 INCASE)    else  in CISCO.COM

       To download ios to tftp:

       NOTE:ALWAYS CONNECT ETHERNET CABLE WITH PC TO WIFI TO TRANSFER IOS

        Log into the working cisco router and follow the below mentioned command to copy ios to tftp

      #archive upload-sw /version c1130-k9w7-mx.124-21a.JY  tftp://10.0.0.2/ c1130-k9w7-mx.124-21a.JA1.tar

        Note: don’t ever forget to give version above command

      -now it will upload the CORRECT  image ios file into TFTP path.

      - when you checked the path in the tftp server it shows the file name as .tar.tar twice at the last

       So simply erase one .tar( Make it with only .tar)

 

 

 

 

4->ENTER  CISCO WIFI ROUTER  THROUGH CLI

       Note: ensure we can only able to work  in the recovery mode (EX: ap)

      ap: tftp_init

      ap: ether_init

      ap: flash_init

      ap: tar -xtract tftp://10.0.0.2/images/c1130-k9w7-mx.124-21a.JA1.tar flash:

     note:don’t ever forget to give /images , else it will prompt the error like (no such  file   directory found)

     now it will extract the image ios into the router

     ap:set

    BOOT=flash:/c1130-k9w7-mx.124-21a.JA1

     Note : don’t give extension as .tar

     NOW

   ap: reset 

    (in ap: mode we use reset for reload , instead of reload in wifi router)

   5->SIMPLY CONFIGURE IP AND GATEWAY TO USE THE ROUTER

 

 

 

 

 

 

 

 

 

I too have converted LWAPP to IOS many times

 

but method does not seem to work for C-1602i  access point

i have tried at least two different k9w7 images

and get this error message

 


*Mar  1 00:43:39.737: Using SHA-1 signed certificate for image signing validation.
*Mar  1 00:43:39.737: Error opening file flash:/update/ap1g2-k9w7-mx.153-3.JAB/final_hash.sig
*Mar  1 00:43:39.737: Digital Signature Failed Validation (flash:/update/ap1g2-k9w7-mx.153-3.JAB/final_
hash)
*Mar  1 00:43:39.737: AP image integrity check FAILED
Aborting Image Download

andre everette
Community Member

Hi Sunrendra,

 

My issue is that when using the archive download-sw command I get a (No such file or directory). But I can use a copy command and move the tar file from the tftp server to the flash drive. Since I can get the image to the device this way...is there a command I can use to load the image to the device? I'm going from LWAPP to autonomous..  Your advice is much appreciated. 

 

AP6c20.56a0.d4ae#$ad /overwrite tftp://10.0.0.2/c1140-k9w7-tar.152-4.JA1.tar
examining image...
%Error opening tftp://10.0.0.2/c1140-k9w7-tar.152-4.JA1.tar (No such file or directory)
archive download: takes 4 seconds

 

 

AP6c20.56a0.d4ae#sh ip int bri
Interface                  IP-Address      OK? Method Status                Protocol
BVI1                       10.0.0.3        YES DHCP   up                    up
GigabitEthernet0           unassigned      NO  unset  up                    up
GigabitEthernet0.1 

 

Easy Tutorial for conversion from Lightweight to Autonomous

https://www.youtube.com/watch?v=d7XTGGrUYBA

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: