articles » current » information-technology » software » firmware » cisco-air-lap1142n-a-k9

Cisco Aironet Access Point AIR-LAP1142N-A-K9 and AIR-AP1041N-A-K9 Firmware

Download Cisco firmware c1140-k9w7-mx.124-25d.JA with instructions on how to upgrade to it

Perhaps a Cisco Access Point has lightweight (lwapp-k9w8) software installed but the full-autonomous (k9w7) software is what is needed. Whatever the reason, follow these steps to install the autonomous firmware on these Cisco Access Points.

Familiarity with Internet Protocol (IP) is a requirement.

Installing the firmware on the access point requires a DB9-to-RJ45 Cisco console cable as pictured here.

These are also available in USB-to-RJ45.

  1. Download the Cisco AP 1140 firmware.
  2. Download TFTPD32. NOTE: Google Chrome may incorrectly mark this as malicious — confirm keeping it otherwise Edge works.
  3. Download PuTTY.
  4. Configure TFTPD32 (TFTP Server) to bind to the Windows PC IP address (192.168.1.57 in this case) and set the security to Read Only. Make sure the firmware file is available in the Base Directory.
  5. Confirm the communications port (COM port) on the Windows PC by using Device Manager. In this case, COM1.
  6. Plug the Cisco console cable into a communications port (COM port) on the Windows PC and the console port of the access point.
  7. Configure PuTTY to use the choosen COM port. COM1 in this case.
  8. Plug-in the Cisco Access Point while holding its MODE button. Hold the MODE button for 30 seconds. The LED on the access point should turn solid red. At this point release the MODE button and start the PuTTY session. (The LED will blink green then blink red.)
  9. PuTTY should look something like this (or, depending on how quickly PuTTY was started, it could be just a black screen with a green square — if so, then hit the ENTER key to show the "ap:" prompt):
    using  eeprom values
    
    WRDTR,CLKTR: 0x83000800 0xc0000000
    RQDC ,RFDC : 0x80000038 0x00000185
    
    using ▒▒▒▒ ddr static values from serial eeprom
    ddr init done
    
    IOS Bootloader - Starting system.
    FLASH CHIP:  Numonyx P33
    Checking for Over Erased blocks
    ..........................................................................................................
    ..........................................................................................................
    ..................................
    Xmodem file system is available.
    
    DDR values used from system serial eeprom.
    WRDTR,CLKTR: 0x83000800, 0xc0000000
    RQDC, RFDC : 0x80000038, 0x00000185
    
    PCIE0: link is up.
    PCIE0: VC0 is active
    PCIE1: link is NOT up.
    PCIE1 port 1 not initialized
    PCIEx: initialization done
    flashfs[0]: 148 files, 7 directories
    flashfs[0]: 0 orphaned files, 0 orphaned directories
    flashfs[0]: Total bytes: 32385024
    flashfs[0]: Bytes used: 5682176
    flashfs[0]: Bytes available: 26702848
    flashfs[0]: flashfs fsck took 24 seconds.
    Reading cookie from system serial eeprom...Done
    Base Ethernet MAC address: 60:73:5c:a7:49:bd
    Ethernet speed is 1000 Mb - FULL duplex
    button is pressed, wait for button to be released...
    button pressed for 36 seconds
    process_config_recovery: set IP address and config to default 10.0.0.1
    process_config_recovery: image recovery
    image_recovery: Download default IOS tar image tftp://255.255.255.255/c1140-k9w7-tar.default
    
    examining image...
    %Error opening tftp://255.255.255.255/c1140-k9w7-tar.default (connection timed out)
    ap: 
    
  10. Enter these set commands at the "ap:" prompt (substitute with the IP information of the local area network in use):
    ap: set IP_ADDR 192.168.1.2
    
    ap: set NETMASK 255.255.255.0
    
    ap: set DEFAULT_ROUTER 192.168.1.1
    
  11. Enter these init commands at the "ap:" prompt:
    ap: tftp_init
    
    ap: ether_init
    
    ap: flash_init
    Initializing Flash...
    ...The flash is already initialized.
    
  12. Issue this tar command to download and extract the firmware from the Windows PC running TFTPD32 (TFTP Server) to the flash memory on the access point:
    ap: tar -xtract tftp://192.168.1.57/c1140-k9w7-tar.124-25d.JA.tar flash:
    
  13. The extraction should look something like this:
    extracting info (283 bytes)
    c1140-k9w7-mx.124-25d.JA/ (directory) 0 (bytes)
    c1140-k9w7-mx.124-25d.JA/html/ (directory) 0 (bytes)
    c1140-k9w7-mx.124-25d.JA/html/level/ (directory) 0 (bytes)
    c1140-k9w7-mx.124-25d.JA/html/level/1/ (directory) 0 (bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/appsui.js (557 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/back.shtml (506 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/cookies.js (5026 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/forms.js (17486 bytes)...
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/sitewide.js (16548 bytes)...
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/config.js (24933 bytes).....
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/stylesheet.css (3214 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/popup_capabilitycodes.shtml.gz (1015 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/filter.js.gz (1801 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/filter_vlan.js.gz (1461 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/filter_mac_ether.js.gz (1710 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/security.js.gz (957 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/vlan.js.gz (955 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ssid.js.gz (4098 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/dot1x.js.gz (982 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/network-if.js.gz (2080 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/stp.js.gz (952 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_assoc.shtml.gz (6087 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_event-log.shtml.gz (4398 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_home.shtml.gz (6949 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_network-if.shtml.gz (4063 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_network-map.shtml.gz (4356 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_services.shtml.gz (4185 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_system-sw.shtml.gz (3382 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/ap_contextmgr.shtml.gz (4187 bytes).
    c1140-k9w7-mx.124-25d.JA/html/level/1/images/ (directory) 0 (bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/ap_title_appname.gif (2042 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/c1040_title_appname.gif (2058 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button.gif (1211 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_1st.gif (1171 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_cbottom.gif (318 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_current.gif (1206 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_endcap.gif (878 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_encap_last.gif (333 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_last.gif (386 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_button_nth.gif (1177 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_leftnav_dkgreen.gif (869 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_leftnav_green.gif (879 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_leftnav_upright.gif (64 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/apps_leftnav_yellow.gif (881 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/arrowdown_red.gif (108 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/arrowup_green.gif (108 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/corner_ur_7.gif (53 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/dkgreenmask11_up.gif (113 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/dkgreenmask28_upright.gif (110 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/grn_vertlines_bottom.gif (149 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/grn_vertlines_top.gif (141 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/hinav_plus.gif (56 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/left_bkg.gif (146 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/list_data.gif (122 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/logo.gif (29454 bytes)......
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/pixel.gif (49 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/sitewide_downleft.gif (53 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/sitewide_help_off.gif (934 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/sitewide_help_on.gif (934 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/sitewide_print_off.gif (111 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/spacer.gif (49 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/sitewide_print_on.gif (111 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/whitemask11_botleft.gif (62 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/whitemask11_upright.gif (61 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_alert.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_critical.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_debugging.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_emergency.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_error.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_information.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_notification.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/event_warning.gif (73 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/1/images/check_mark.gif (71 bytes)
    c1140-k9w7-mx.124-25d.JA/html/level/15/ (directory) 0 (bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_assoc_adv.shtml.gz (4637 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_event-log_config-options.shtml.gz (6199 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_event-log_notif-options.shtml.gz (3187 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_express-setup.shtml.gz (11588 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_express-security.shtml.gz (13867 bytes)...
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/def_broadcast-ssid.shtml.gz (1259 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/def_no-security.shtml.gz (1578 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/def_eap-security.shtml.gz (1787 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/def_wep-security.shtml.gz (1593 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/def_wpa-security.shtml.gz (1849 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_ipaddress.shtml.gz (5075 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_802-11.shtml.gz (6896 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_802-11_b.shtml.gz (6832 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_802-11_c.shtml.gz (25249 bytes).....
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/dBm_mW_translation_table.shtml.gz (1509 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_802-11_d.shtml.gz (4546 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_ethernet.shtml.gz (4888 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-if_ethernet_b.shtml.gz (5988 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz (4277 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec.shtml.gz (7748 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-client-security.shtml.gz (26562 bytes).....
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-key-security.shtml.gz (12792 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_local-admin-access.shtml.gz (7468 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_network-security_a.shtml.gz (10738 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_network-security_b.shtml.gz (6110 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_lrs.shtml.gz (5575 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_lrs_b.shtml.gz (9045 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_lrs_c.shtml.gz (6689 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz (5472 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz (5553 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz (5157 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz (4094 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ids_mfp.shtml.gz (4400 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (4129 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_dot1x-security.shtml.gz (6947 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_dot1x-certificates.shtml.gz (11666 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz (572 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_arp.shtml.gz (3508 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_cdp.shtml.gz (5612 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_console-telnet.shtml.gz (7309 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_dns.shtml.gz (4078 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_filters.shtml.gz (5712 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_filters-ip.shtml.gz (8948 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_filters-mac.shtml.gz (4491 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_filters-ether.shtml.gz (4343 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_hot-standby.shtml.gz (6000 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_http.shtml.gz (6481 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_mobile-ip-b.shtml.gz (7199 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_mobile-ip-c.shtml.gz (4619 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_mobile-ip-d.shtml.gz (5679 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_mobile-ip.shtml.gz (6565 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_qos-traffic.shtml.gz (8667 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_qos.shtml.gz (12698 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_qos_adv.shtml.gz (4941 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_voice.shtml.gz (4578 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_voice-traffic.shtml.gz (6857 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_snmp.shtml.gz (8504 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_sntp.shtml.gz (6438 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_services_vlan.shtml.gz (13288 bytes)..
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_stationview-client_ltest.shtml.gz (6027 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade-b.htm (225 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6712 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade.htm (223 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade.shtml.gz (6746 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade_poll.htm (228 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_upgrade_poll.shtml (3590 bytes)
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_system-sw_sysconfig.shtml.gz (7623 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_stationview-client.shtml.gz (6077 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_contextmgr_ap.shtml.gz (5277 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_contextmgr_scm.shtml.gz (5793 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_contextmgr_scm-groups.shtml.gz (8003 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5559 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA (4790272 bytes)..............................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    ..........................................................................................................
    .......................................................
    extracting c1140-k9w7-mx.124-25d.JA/8001.img (174876 bytes)......................................
    extracting c1140-k9w7-mx.124-25d.JA/T2.bin (8080 bytes).
    extracting c1140-k9w7-mx.124-25d.JA/T5.bin (23836 bytes).....
    extracting c1140-k9w7-mx.124-25d.JA/info (283 bytes)
    extracting info.ver (283 bytes)
    
  14. Issue this set BOOT command and restart the device (the access point will use DHCP to configure its IP address):
    ap: set BOOT flash://c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA
    
    ap: boot
    
  15. After the restart and using a web-browser, navigate to the IP address of the access point. When prompted for a user and password enter Cisco for both.
  16. Use the web-browser to configure the access point.

This site uses cookies. Cookies are simple text files stored on the user's computer. They are used for adding features and security to this site. Read the privacy policy.
CLOSE