So, finally I got 6 brand new Cisco 1142n wireless access points. They all are lightweight access points, which means that more less Wireless Controller is required to get them to work. Unfortunatelly due to many circumstances I have purchase of Wireless Controller delayed, so for now have to turn all of those into autonomus wireless devices. That means that IOS has to be replaced on those devices to allow 1142n be fully configured.

  • Original software which came on devices was: c1140-rcvk9w8-mx.
  • New software I had to deploy on all of them to make them autonomus is: c1140-k9w7-tar.124-25d.JA1.

But how the whole process happenes? Here are all steps I took to make lightweight AP become autonomus wireless access point:

So, 1142n is starting:

ddr init done

Running Normal Memtest...

Passed.IOS Bootloader - Starting system.FLASH CHIP:  Numonyx P33Checking for Over Erased blocks
...............................................................................................Xmodem file system is available.
DDR values used from system serial eeprom.WRDTR,CLKTR: 0x87000800, 0x40000000RQDC, RFDC : 0x80000036, 0x0000020b
PCIE0: link is up.PCIE0: VC0 is activePCIE1: link is up.PCIE1: VC0 is activePCIEx: initialization done
flashfs[0]: 4 files, 2 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 2264064
flashfs[0]: Bytes available: 30120960
flashfs[0]: flashfs fsck took 17 seconds.
Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: c4:64:13:5b:a4:9e
Ethernet speed is 100 Mb - FULL duplex
Loading "flash:/c1140-rcvk9w8-mx/c1140-rcvk9w8-mx"...########################################################################
File "flash:/c1140-rcvk9w8-mx/c1140-rcvk9w8-mx" uncompressed and installed, entry point: 0x4000
executing...
enet halted
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C1140 Software (C1140-RCVK9W8-M), Version 12.4(21a)JA, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2009 by Cisco Systems, Inc.
Compiled Mon 08-Jun-09 16:28 by prod_rel_team

Proceeding with system init
Proceeding to unmask interrupts
Initializing flashfs...

flashfs[1]: 4 files, 2 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 32385024
flashfs[1]: Bytes used: 2264064
flashfs[1]: Bytes available: 30120960
flashfs[1]: flashfs fsck took 5 seconds.
flashfs[1]: Initialization complete....done Initializing flashfs.
Ethernet speed is 100 Mb - FULL duplex

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
<a href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html">http://www.cisco.com/wwl/export/crypto/tool/stqrg.html</a>

If you require further assistance please contact us by sending email to
<a href="mailto:export@cisco.com">export@cisco.com</a>.

cisco AIR-LAP1142N-E-K9    (PowerPC405ex) processor (revision B0) with 98294K/32768K bytes of memory.
Processor board ID FCZ1553W3E6
PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from power-on
LWAPP image version 3.0.51.0
1 Gigabit Ethernet interface

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: C4:64:13:5B:A4:9E
Part Number                          : 73-12836-04
PCA Assembly Number                  : 800-33767-04
PCA Revision Number                  : A0
PCB Serial Number                    : FOC15507PH2
Top Assembly Part Number             : 800-33775-03
Top Assembly Serial Number           : FCZ1553W3E6
Top Revision Number                  : A0
Product/Model Number                 : AIR-LAP1142N-E-K9
% Please define a domain-name first.

Press RETURN to get started!

*Mar  1 00:00:06.611: *** CRASH_LOG = YES
Base Ethernet MAC address: C4:64:13:5B:A4:9E

*Mar  1 00:00:06.798: %LWAPP-3-CLIENTEVENTLOG: Unable to open event log file flash:/event.log

*Mar  1 00:00:06.799: %LWAPP-3-CLIENTEVENTLOG: Read and initialized AP event log (contains, 0 messages)

*Mar  1 00:00:08.847: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar  1 00:00:08.863: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1140 Software (C1140-RCVK9W8-M), Version 12.4(21a)JA, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2009 by Cisco Systems, Inc.
Compiled Mon 08-Jun-09 16:28 by prod_rel_team
*Mar  1 00:11:32.010: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
*Mar  1 00:11:32.982: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Mar  1 00:11:40.334: %DHCP-6-ADDRESS_ASSIGN: Interface GigabitEthernet0 assigned DHCP address 172.16.90.181, mask 255.255.255.0, hostname APc464.135b.a49e

*Mar  1 00:11:54.271: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C3560-48PS (0025.4510.7526)
Translating "CISCO-CAPWAP-CONTROLLER.domain.com"...domain server (172.16.90.11)

Translating "CISCO-LWAPP-CONTROLLER.domain.com"...domain server (172.16.90.11)

*Mar  1 00:12:01.965: %CAPWAP-3-ERRORLOG: Did not get log server settings from DHCP.
*Mar  1 00:12:02.966: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER.domain.com
*Mar  1 00:12:02.968: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLLER.domain.com
*Mar  1 00:12:54.276: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C3560-48PS (0025.4510.7526)
*Mar  1 00:28:52.967: %CAPWAP-3-ERRORLOG: Discovery failed times. Release/Renew DHCP
Not in Bound state.
*Mar  1 00:29:01.598: %DHCP-6-ADDRESS_ASSIGN: Interface GigabitEthernet0 assigned DHCP address 172.16.90.181, mask 255.255.255.0, hostname APc464.135b.a49e

Translating "CISCO-CAPWAP-CONTROLLER.domain.com"...domain server (172.16.90.11)

Translating "CISCO-LWAPP-CONTROLLER.domain.com"...domain server (172.16.90.11)

*Mar  1 00:29:09.472: %CAPWAP-3-ERRORLOG: Did not get log server settings from DHCP.
*Mar  1 00:29:10.473: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER.domain.com
*Mar  1 00:29:10.474: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLLER.domain.com
APc464.135b.a49e>

And now I landed in CLI with password already set for ena mode. Now it’s time to replace existing IOS with new, fully autonomus:

APc464.135b.a49e>ena
Password:
APc464.135b.a49e#debug capwap concole cli
CAPWAP console CLI allow/disallow debugging is on
APc464.135b.a49e#archive download-sw /force-reload /overwrite tftp://172.16.90.21/c1140-k9w7-tar.124-25d.JA1.tar
examining image...
Loading c1140-k9w7-tar.124-25d.JA1.tar from 172.16.90.21 (via GigabitEthernet0): !
extracting info (286 bytes)
Image info:
Version Suffix: k9w7-.124-25d.JA1
Image Name: c1140-k9w7-mx.124-25d.JA1
Version Directory: c1140-k9w7-mx.124-25d.JA1
Ios Image Size: 4977152
Total Image Size: 5755392
Image Feature: WIRELESS LAN
Image Family: C1140
Wireless Switch Management Version: 7.0.94.21
Extracting files...</pre>
c1140-k9w7-mx.124-25d.JA1/ (directory) 0 (bytes)
c1140-k9w7-mx.124-25d.JA1/html/ (directory) 0 (bytes)
c1140-k9w7-mx.124-25d.JA1/html/level/ (directory) 0 (bytes)
c1140-k9w7-mx.124-25d.JA1/html/level/1/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/appsui.js (557 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/back.shtml (506 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/cookies.js (5026 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/forms.js (17486 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/sitewide.js (16548 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/config.js (24933 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/stylesheet.css (3214 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/popup_capabilitycodes.shtml.gz (1015 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/filter.js.gz (1860 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/filter_vlan.js.gz (1408 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/filter_mac_ether.js.gz (1793 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/security.js.gz (957 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/vlan.js.gz (955 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ssid.js.gz (4098 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/dot1x.js.gz (982 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/network-if.js.gz (2080 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/stp.js.gz (952 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_assoc.shtml.gz (6087 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_event-log.shtml.gz (4398 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_home.shtml.gz (6949 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_network-if.shtml.gz (4063 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_network-map.shtml.gz (4356 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_services.shtml.gz (4185 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_system-sw.shtml.gz (3382 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/ap_contextmgr.shtml.gz (4187 bytes)
c1140-k9w7-mx.124-25d.JA1/html/level/1/images/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/ap_title_appname.gif (2042 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/c1040_title_appname.gif (2058 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button.gif (1211 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_1st.gif (1171 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_cbottom.gif (318 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_current.gif (1206 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_endcap.gif (878 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_encap_last.gif (333 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_last.gif (386 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_button_nth.gif (1177 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_leftnav_dkgreen.gif (869 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_leftnav_green.gif (879 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_leftnav_upright.gif (64 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/apps_leftnav_yellow.gif (881 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/arrowdown_red.gif (108 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/arrowup_green.gif (108 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/corner_ur_7.gif (53 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/dkgreenmask11_up.gif (113 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/dkgreenmask28_upright.gif (110 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/grn_vertlines_bottom.gif (149 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/grn_vertlines_top.gif (141 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/hinav_plus.gif (56 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/left_bkg.gif (146 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/list_data.gif (122 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/logo.gif (29454 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/pixel.gif (49 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/sitewide_downleft.gif (53 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/sitewide_help_off.gif (934 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/sitewide_help_on.gif (934 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/sitewide_print_off.gif (111 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/sitewide_print_on.gif (111 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/spacer.gif (49 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/whitemask11_botleft.gif (62 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/whitemask11_upright.gif (61 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_alert.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_critical.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_debugging.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_emergency.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_error.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_information.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_notification.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/event_warning.gif (73 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/1/images/check_mark.gif (71 bytes)
c1140-k9w7-mx.124-25d.JA1/html/level/15/ (directory) 0 (bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_assoc_adv.shtml.gz (4637 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_event-log_config-options.shtml.gz (6199 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_event-log_notif-options.shtml.gz (3187 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_express-setup.shtml.gz (11588 bytes)!
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_express-security.shtml.gz (13867 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/def_broadcast-ssid.shtml.gz (1259 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/def_no-security.shtml.gz (1578 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/def_eap-security.shtml.gz (1787 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/def_wep-security.shtml.gz (1593 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/def_wpa-security.shtml.gz (1849 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_ipaddress.shtml.gz (5075 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_802-11.shtml.gz (6896 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_802-11_b.shtml.gz (6832 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_802-11_c.shtml.gz (25249 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/dBm_mW_translation_table.shtml.gz (1509 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_802-11_d.shtml.gz (4546 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_ethernet.shtml.gz (4888 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-if_ethernet_b.shtml.gz (5988 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_network-map_ap-adjacent-list.shtml.gz (4277 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec.shtml.gz (7748 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-client-security.shtml.gz (26562 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-key-security.shtml.gz (12792 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_local-admin-access.shtml.gz (7468 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_network-security_a.shtml.gz (10738 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_network-security_b.shtml.gz (6110 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_lrs.shtml.gz (5575 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_lrs_b.shtml.gz (9045 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_lrs_c.shtml.gz (6689 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-client-security-adv_a.shtml.gz (5472 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-client-security-adv_b.shtml.gz (5553 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-client-security-adv_c.shtml.gz (5157 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ap-client-security-adv_d.shtml.gz (4094 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ids_mfp.shtml.gz (4400 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_ids_mfp_stats.shtml.gz (4129 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_dot1x-security.shtml.gz (6947 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_dot1x-certificates.shtml.gz (11666 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_sec_dot1x-cert_fingerprint.shtml.gz (572 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_arp.shtml.gz (3508 bytes)!
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_cdp.shtml.gz (5612 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_console-telnet.shtml.gz (7309 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_dns.shtml.gz (4078 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_filters.shtml.gz (5712 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_filters-ip.shtml.gz (8948 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_filters-mac.shtml.gz (4507 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_filters-ether.shtml.gz (4358 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_hot-standby.shtml.gz (6000 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_http.shtml.gz (6481 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_mobile-ip-b.shtml.gz (7199 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_mobile-ip-c.shtml.gz (4619 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_mobile-ip-d.shtml.gz (5679 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_mobile-ip.shtml.gz (6565 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_qos-traffic.shtml.gz (8667 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_qos.shtml.gz (12698 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_qos_adv.shtml.gz (4941 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_voice.shtml.gz (4578 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_voice-traffic.shtml.gz (6857 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_snmp.shtml.gz (8504 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_sntp.shtml.gz (6438 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_services_vlan.shtml.gz (13288 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_stationview-client_ltest.shtml.gz (6027 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade-b.htm (225 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade-b.shtml.gz (6712 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade.htm (223 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade.shtml.gz (6746 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade_poll.htm (228 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_upgrade_poll.shtml (3590 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_system-sw_sysconfig.shtml.gz (7623 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_stationview-client.shtml.gz (6077 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_contextmgr_ap.shtml.gz (5277 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_contextmgr_scm.shtml.gz (5793 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_contextmgr_scm-groups.shtml.gz (8003 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/html/level/15/ap_contextmgr_scm_summary.shtml.gz (5559 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/c1140-k9w7-mx.124-25d.JA1 (4791401 bytes)!!!!!!!!!!!!!!!!!!!
extracting c1140-k9w7-mx.124-25d.JA1/8001.img (174876 bytes)!
extracting c1140-k9w7-mx.124-25d.JA1/T2.bin (8080 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/T5.bin (23836 bytes)
extracting c1140-k9w7-mx.124-25d.JA1/info (286 bytes)
extracting info.ver (286 bytes)
[OK - 5754880 bytes]

Deleting current version: flash:/c1140-rcvk9w8-mx...done.
New software image installed in flash:/c1140-k9w7-mx.124-25d.JA1
Configuring syste m to use new image...done.
Requested system reload in progress...
archive download: takes 76 seconds
Writing out the event log to nvram...
  1. Default enable password set on Cisco 1142n is “Cisco”.
  2. IOS replacement uploaded to device was downloaded from Cisco download repository available for registered customers with support contracts.

And now Cisco 1142n lightweight became fully autonomus wireless access point 🙂