I have 2 ap of c1100, which are flash earased and I tried to reload the image through TFTP on mode button as cisco help below steps.
Step 1 The PC you intend to use must be configured with a static IP address in the range of 10.0.0.2 to 10.0.0.30.
Step 2 Place a copy of the access point image file (such as c1100-k9w7-tar.122-15.JA.tar for an 1100 series access point or c1200-k9w7-tar.122-15.JA.tar for a 1200 series access point) in the TFTP server folder on your PC. For additional information, refer to the "Obtaining the Access Point Image File" and "Obtaining TFTP Server Software" sections.
Step 3 Rename the access point image file in the TFTP server folder to c1100-k9w7-tar.default for an 1100 series access point or c1200-k9w7-tar.default for a 1200 series access point.
Step 4 Activate the TFTP server.
Step 5 Connect the PC to the access point using a Category 5 (CAT5) Ethernet cable.
Step 6 Disconnect power (the power jack for external power or the Ethernet cable for in-line power) from the access point.
Step 7 Press and hold the MODE button while you reconnect power to the access point.
Step 8 Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button.
Step 9 Wait until the access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green.
But finally i got a message from tftp, sending file and after fewe seconds request time out from 10.0.0.1.
I can't ping ap also means AP default ip also don't have.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...