This article aims to provide a framework of steps to be taken to configure a Cisco 1140 series Access Point to work as a stand alone unit that is connected to a router as a zone extender from what may or may not have an integral wireless WiFi feature – some routers do and others don’t.

This video runs through the steps to prepare for and program the AP (whilst this is a .MP4 video, some Apple browsers may be unable to decode it – I am working on making this a universally compatible video)

Just to be clear. The Cisco 114x series access points are fundamentally the same but some have two raidios and some only one. Therefore, ones with two radios, such as the AP1142 act as wireless WiFi acccess points with two SSID’s being broadcast, typically one at 2.4 GHz for legacy WiFi clients and the other at 5 GHz for the more modern devices. This article uses the AP1142 as reference.

The degree of flexibility offered by these access points is beyond the scope of this article since they ca not only act in groups, as backup units that step in – Cisco refers to this as Hot Standby, if a nearby unit fails and many other combinations of swarm like operation. Remember that these units were designed for inducstrial and commercial use cases such as shopping centres and corporate multi storey buildings spanning quite a large space.

One significant nuance that should be highlighted is that there is what is known as Autonomous Mode. This is when the unit operates independent of any controller or as part of a swarm, where it is assigned an IP address and uses that to funnel data back and forth between the two WiFi radio channels and devices connected to them and the router that it is connected to via the hard wred network port, acting as a bridge between the two ends and ultimately between users and the WWW.

CAPWAP

Cisco lightweight access points use the IETF standard Control and Provisioning of Wireless Access Points Protocol (CAPWAP) to communicate with the controller and other lightweight access points on the network.

https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-6/config-guide/b_cg86/ap_connectivity_to_cisco_wlc.html

The following document is a mere chapter in one of many Cisco technical documents available to guide technicians in setting these devices up though the command line interface and Cisco IOS. Whilst it is specific, it gives an overview of the mindset of anyone considering taking on this task.

Applicaiton Specific

As referred to in the title of this article. In as far as technical configuration objective is concerned, our ultimate goal is to program our Cisco AP1142 in such a way that we can plug it into our router and power it up (details of POE routers are covered in a separate article). Resulting in two new WiFi SSID’s appearing in our airways that we can connect to.

We will be enabling AES encryption for users to connect to the WiFi Access Point using simple ASCII passwords in an effort to simplify its’ use as far as possible.

Preparation, before we begin programming

We need a computer that is running Putty Terminal Emulator. An I/O port from the computer running Putty so tht we can send and receive commnds and data to the connected Device being programmed, the AP1142.

To physcially connect our computer to the AP, we need a special cable. In our case a special Serial cable with USB connector at one end and an RJ45 connector at the other end.

We are using Windows on our laptop but this can of course be done using an Apple Mac or a computer with similar IO ports running any flavour of the Linux OS.

Due to technical reasons, Windows assigns one of 64 possible COM port identifiers to any USB Serial Port Emulator device connected to one of the laptop ports. In the old days, a computer would have one COM port and that would always be identified as COM1 but with the advent of USB serial ports, the operating system has devised a way to assigned a number after, resulting the possibility of COMx being anything from COM1, COM2, COM5, COM7 or some other COMx number.

The COMx number is important as we have to tell PuTTy which one to communicate through. Otherwise, we arae not likely to establish a link with the AP1142 that is apparently and physically connected to our laptop.

The following text document is a log of the actual configuration of our unit which was prepared as follows; We include a TEXT file of the same code as shown below..

2024 11 15 TT
Re-program Ciso1142 AP to serve as an access point - plugged into Asus RT-AC500 router

Note:----
Factory reset the AP1142 by holding reset whilst powering it on...

Background ----
After losing connection to it... The AP has been tested and is known to be working with two clients connected and using www services.

Subsequent changes----
that we have made two further updates to this configuration.

1. Added DNS 194.168.4.100 194.168.8.100 and 8.8.8.8
2. NTP (Time Server) 3.uk.pool.ntp.org  

The NTP service has successfully pulled the correct time and date from the server.

Poewr on Reset -- Boot up messages -------------------

IOS Bootloader - Starting system.
FLASH CHIP:  Numonyx P33
Checking for Over Erased blocks
.....................................................................                           
.....................................................................                           
.....................................................................                           
.......................................
Xmodem file system is available.

DDR values used from system serial eeprom.
WRDTR,CLKTR: 0x84000800, 0x40000000
RQDC, RFDC : 0x80000038, 0x0000020d

PCIE0: link is up.
PCIE0: VC0 is active
PCIE1: link is up.
PCIE1: VC0 is active
PCIEx: initialization done

flashfs[0]: 153 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32385024
flashfs[0]: Bytes used: 8051712
flashfs[0]: Bytes available: 24333312
flashfs[0]: flashfs fsck took 22 seconds.

Reading cookie from system serial eeprom...Done
Base Ethernet MAC address: 30:e4:db:44:f8:b9
Waiting for PHY auto negotiation to complete... TIMEOUT !
Ethernet link is down.

The system has encountered an error initializing
the Ethernet port.

The system is ignoring the error and continuing to boot.
If you abort the system boot process, the following
commands will re-initialize Ethernet, TFTP, and finish
loading the operating system software:

    ether_init
    tftp_init
    boot

button pressed for 19 seconds
process_config_recovery: set IP address and config to default 10.0.0.                            1
Loading "flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA"...                            
#####################################################################                            
#####################################################################                           
#####################################################################                            
#####################################################################                            
#####################################################################                            
#####################################################################                            
#####################################################################                            
##

File "flash:/c1140-k9w7-mx.124-25d.JA/c1140-k9w7-mx.124-25d.JA" 
uncom pressed and installed, entry point: 0x4000

executing...
enet halted

              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706

Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(25d)J                           
A, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Thu 09-Dec-10 15:24 by prod_rel_team


Proceeding with system init

Proceeding to unmask interrupts
Initializing flashfs...
FLASH CHIP:  Numonyx P33
Checking for Over Erased blocks
.....................................................................                            
.....................................................................                            
.....................................................................                           
.......................................

flashfs[1]: 152 files, 8 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 32126976
flashfs[1]: Bytes used: 8048128
flashfs[1]: Bytes available: 24078848
flashfs[1]: flashfs fsck took 5 seconds.
flashfs[1]: Initialization complete.
flashfs[2]: 0 files, 1 directories
flashfs[2]: 0 orphaned files, 0 orphaned directories
flashfs[2]: Total bytes: 11999232
flashfs[2]: Bytes used: 1024
flashfs[2]: Bytes available: 11998208
flashfs[2]: flashfs fsck took 1 seconds.
flashfs[2]: Initialization complete....done Initializing flashfs.

Radio0  present 8363 8000 90020000 0 90030000 B
Radio1  present 8363 8000 98020000 0 98030000 0
Waiting for PHY auto negotiation to complete... TIMEOUT !
Ethernet link is down.

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption                            .
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco AIR-AP1142N-E-K9    (PowerPC405ex) processor (revision A0) with  
98294K/32768K bytes of memory.

Processor board ID FCZ1526W4AT

PowerPC405ex CPU at 586Mhz, revision number 0x147E
Last reset from watchdog timer expired
1 Gigabit Ethernet interface
2 802.11 Radio(s)

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: 30:E4:DB:44:F8:B9
Part Number                          : 73-12836-02
PCA Assembly Number                  : 800-33767-02
PCA Revision Number                  : A0
PCB Serial Number                    : FOC15241CLR
Top Assembly Part Number             : 800-33775-01
Top Assembly Serial Number           : FCZ1526W4AT
Top Revision Number                  : A0
Product/Model Number                 : AIR-LAP1142N-E-K9



Press RETURN to get started!


*Mar  1 00:00:07.754: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed
*Mar  1 00:00:07.771: *** CRASH_LOG = YES

*Mar  1 00:00:09.056: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0
*Mar  1 00:00:09.623: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1Base Ethernet MAC address: 30:E4:DB:44:F8:B9

*Mar  1 00:00:50.383: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to u             ap>
ap>
*Mar  1 00:00:51.461: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEtherne             t0, changed state to down
*Mar  1 00:13:40.000: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to admin             istratively down
*Mar  1 00:13:40.000: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to admin             istratively down
*Mar  1 00:13:40.002: %CDP_PD-4-POWER_OK: Full power - AC_ADAPTOR inline power sourc             e
*Mar  1 00:13:40.017: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(25d)JA, RELEASE SOFT             WARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Thu 09-Dec-10 15:24 by prod_rel_team
*Mar  1 00:13:40.017: %SNMP-5-COLDSTART: SNMP agent on host ap is undergoing a cold              start
*Mar  1 00:13:40.990: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed              state to up
*Mar  1 00:13:41.000: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, c             hanged state to down
*Mar  1 00:13:41.000: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, c             hanged state to down
*Mar  1 00:13:51.930: %LINK-3-UPDOWN: Interface BVI1, changed state to down
*Mar  1 00:13:52.930: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to down
ap>
ap>
ap>
ap>enable
Password:
ap#
ap#
ap#conf term
Enter configuration commands, one per line.  End with CNTL/Z.
ap(config)#
ap(config)#exit
ap#
ap#
ap#?
Exec commands:
  access-enable    Create a temporary Access-List entry
  access-template  Create a temporary Access-List entry
  archive          manage archive files
  cd               Change current directory
  clear            Reset functions
  clock            Manage the system clock
  configure        Enter configuration mode
  connect          Open a terminal connection
  copy             Copy from one file to another
  crypto           Encryption related commands.
  debug            Debugging functions (see also 'undebug')
  delete           Delete a file
  dir              List files on a filesystem
  disable          Turn off privileged commands
  disconnect       Disconnect an existing network connection
  dot11            IEEE 802.11 commands
  dot1x            IEEE 802.1X Exec Commands
  enable           Turn on privileged commands
  erase            Erase a filesystem
  exit             Exit from the EXEC
  format           Format a filesystem
  fsck             Fsck a filesystem
  help             Description of the interactive help system
  led              LED functions
  lock             Lock the terminal
  login            Log in as a particular user
  logout           Exit from the EXEC
  mkdir            Create new directory
  monitor          Monitoring different system events
  more             Display the contents of a file
  name-connection  Name an existing network connection
  no               Disable debugging functions
  ping             Send echo messages
  pwd              Display current working directory
  radius           radius exec commands
  release          Release a resource
  reload           Halt and perform a cold restart
  rename           Rename a file
  renew            Renew a resource
  resume           Resume an active network connection
  rmdir            Remove existing directory
  rsh              Execute a remote command
  send             Send a message to other tty lines
  set              Set system parameter (not config)
  show             Show running system information

ap#
ap#
ap#
ap#
ap#show ?
  aaa                Show AAA values
  access-expression  List access expression
  access-lists       List access lists
  accounting         Accounting data for active sessions
  aliases            Display alias commands
  archive            Archive of the running configuration information
  arp                ARP table
  auto               Show Automation Template
  boot               show boot attributes
  bridge             Bridge Forwarding/Filtering Database [verbose]
  buffers            Buffer pool statistics
  call               Show call
  caller             Display information about dialup connections
  cca                CCA information
  cdp                CDP information
  class-map          Show QoS Class Map
  clock              Display the system clock
  configuration      Configuration details
  controllers        Interface controller status
  crypto             Encryption module
  dampening          Display dampening information
  data-corruption    Show data errors
  debugging          State of each debugging option
  derived-config     Derived operating configuration
  dhcp               Dynamic Host Configuration Protocol status
  dot11              IEEE 802.11 show information
  dot1x              Dot1x information
  eap                Shows EAP registration/session information
  event-manager      Event manager information
  exception          exception information
  file               Show filesystem information
  flash:             display information about flash: file system
  hardware           Hardware specific information
  history            Display the session command history
  hosts              IP domain-name, lookup style, nameservers, and host table
  html               HTML helper commands
  iapp               DDP IAPP
  idb                List of Interface Descriptor Blocks
  interfaces         Interface status and configuration
  inventory          Show the physical inventory
  ip                 IP information
  led                LED functions
  line               TTY line information
  location           Display the system location
  logging            Show the contents of logging buffers

ap#
ap#show dot11 ?
  aaa                Authentication, Authorization, and Accounting
  activity-timeout   Default/Maximum activity timeout values
  adjacent-ap        Display Fast Secure Roaming adjacent AP list
  antenna-alignment  Display recent antenna alignment results
  arp-cache          Arp Cache
  associations       association information
  bssid              show SSID to BSSID mapping
  cac                Admission Control Statistics
  carrier            Display recent carrier test results
  directed-roam      Directed Roaming Clients/APs
  ids                Intrusion Detection System
  lbs                Display LBS configuration and status
  linktest           Display recent linktest results
  mac-authen         MAC authentication details
  network-map        Network Map
  statistics         statistics information
  traffic-streams    Admitted WMM Traffic-Streams
  vlan-name          Display VLAN name to ID map(s)

ap#
ap#show dot11 network-map
 network-map is disabled
ap#
ap#
ap#show dot11 mac-authen ?
  filter-cache  MAC filter cache

ap#
ap#show dot11 mac-authen filter-cache ?
  H.H.H  MAC Address
  |      Output modifiers
  <cr>

ap#show dot11 mac-authen filter-cache
ap#
ap#
ap#
ap#
ap#show dot11 bssid

ap#show
ap#show ?
  aaa                Show AAA values
  access-expression  List access expression
  access-lists       List access lists
  accounting         Accounting data for active sessions
  aliases            Display alias commands
  archive            Archive of the running configuration information
  arp                ARP table
  auto               Show Automation Template
  boot               show boot attributes
  bridge             Bridge Forwarding/Filtering Database [verbose]
  buffers            Buffer pool statistics
  call               Show call
  caller             Display information about dialup connections
  cca                CCA information
  cdp                CDP information
  class-map          Show QoS Class Map
  clock              Display the system clock
  configuration      Configuration details
  controllers        Interface controller status
  crypto             Encryption module
  dampening          Display dampening information
  data-corruption    Show data errors

ap#show arp

ap#
ap#show buffers
Buffer elements:
     1119 in free list (1119 max allowed)
     28 hits, 0 misses, 619 created

Public buffer pools:
Small buffers, 104 bytes (total 128, permanent 128):
     128 in free list (20 min, 256 max allowed)
     21 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)
Middle buffers, 600 bytes (total 128, permanent 128):
     128 in free list (10 min, 256 max allowed)
     25 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)
Big buffers, 1536 bytes (total 128, permanent 128):
     128 in free list (5 min, 256 max allowed)
     28 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)
VeryBig buffers, 4520 bytes (total 256, permanent 256):
     256 in free list (0 min, 256 max allowed)
     0 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)
Large buffers, 5024 bytes (total 0, permanent 0):
     0 in free list (0 min, 5 max allowed)
     0 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)
Huge buffers, 18024 bytes (total 0, permanent 0):
     0 in free list (0 min, 2 max allowed)
     0 hits, 0 misses, 0 trims, 0 created
     0 failures (0 no memory)

Interface buffer pools:
Wlan Pool buffers, 2500 bytes (total 1677, permanent 1677):
     711 in free list (0 min, 1677 max allowed)
     966 hits, 0 fallbacks
     838 max cache size, 584 in cache
     254 hits in cache, 0 misses in cache

Header pools:

ap#
-----------------------------------------------------------------------------
ap#
ap#show running-config
Building configuration...

Current configuration : 1414 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ap
!
logging rate-limit console 9
enable secret 5 $1$FYpa$ES9qiBGVJvx5vzMhEWIOk0
!
no aaa new-model
!
!
dot11 syslog
!
!
username Cisco password 7 02250D480809
!
!
bridge irb
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 shutdown
 antenna gain 0
 station-role root
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
 bridge-group 1 spanning-disabled
!
interface Dot11Radio1
 no ip address
 no ip route-cache
 shutdown
 antenna gain 0
 no dfs band block
 channel dfs
 station-role root
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
 bridge-group 1 spanning-disabled
!
interface GigabitEthernet0
 no ip address
 no ip route-cache
 duplex auto
 speed auto
 no keepalive
 bridge-group 1
 no bridge-group 1 source-learning
 bridge-group 1 spanning-disabled
!
interface BVI1
 ip address dhcp client-id GigabitEthernet0
 no ip route-cache
!
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
 login local
!
end
-----------------------------------------------------------------------------
CONFIGURE BV1 (the Bridge interface)
-----------------------------------------------------------------------------
ap#
ap#enable
ap#conf term
Enter configuration commands, one per line.  End with CNTL/Z.
ap(config)#
ap(config)#
ap(config)#
ap(config)#int bv1
ap(config-if)#ip address 192.168.1.200 255.255.255.0
ap(config-if)#
ap(config-if)#exit

ap(config)#ip default-gateway 192.168.1.1
ap(config)#
ap(config)#dot11 ssid Cisco_AP
ap(config-ssid)#
ap(config-ssid)#auth open
ap(config-ssid)#auth key wpa v 2
ap(config-ssid)#
ap(config-ssid)#wpa-psk ascii abc123ABC123
ap(config-ssid)#guest-mode
ap(config-ssid)#exit
-----------------------------------------------------------------------------
CONFIGURE d0 Dot11 Radio 0, The 2.4GHz Wifi radio
-----------------------------------------------------------------------------
ap(config)#
ap(config)#
ap(config)#int d0
ap(config-if)#encryption mode ciphers aes
ap(config-if)#ssid Cisco_AP
ap(config-if)#channel 1
ap(config-if)#no shutdown
ap(config-if)#
*Mar  1 00:31:25.141: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
ap(config-if)#
*Mar  1 00:31:25.149: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
*Mar  1 00:31:26.148: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Mar  1 00:31:31.929: %LINK-3-UPDOWN: Interface BVI1, changed state to up
*Mar  1 00:31:32.929: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
ap(config-if)#
ap(config-if)#
ap(config-if)#exit
ap(config)#
ap(config)#
ap(config)#
ap(config)#
ap(config)#dot11 ssid Cisco_AP 5GHz
ap(config-ssid)#
ap(config-ssid)#
ap(config-ssid)#auth open
ap(config-ssid)#auth key wpa ver 2
ap(config-ssid)#wpa-psk ascii abc123ABC123
ap(config-ssid)#guest-mode
ap(config-ssid)#exit
ap(config)#
ap(config)#
ap(config)#
-----------------------------------------------------------------------------
CONFIGURE d0 Dot11 Radio 1, The 5GHz Wifi radio
-----------------------------------------------------------------------------
ap(config)#
ap(config)#int d1
ap(config-if)#encryption mode ciphers aes
ap(config-if)#ssid Cisco_AP 5GHz
ap(config-if)#no shutdown
ap(config-if)#
*Mar  1 00:33:49.998: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Mar  1 00:33:53.623: %DOT11-6-DFS_SCAN_START: DFS: Scanning frequency 5560 MHz for 60 seconds.
*Mar  1 00:33:53.623: %DOT11-6-FREQ_USED: Interface Dot11Radio1, frequency 5560 selected
*Mar  1 00:33:53.623: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
*Mar  1 00:33:54.623: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
ap(config-if)#
ap(config-if)#
ap(config-if)#channel ?
  <36-5700>  One of: 36 40 44 48 52 56 60 64 100 104 108 112 116 132 136 140
             5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580
             5660 5680 5700
  dfs        Use Dynamic Frequency Selection
  width      Bandwidth used

ap(config-if)#channel 36
ap(config-if)#
*Mar  1 00:34:27.229: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Mar  1 00:34:27.242: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
ap(config-if)#
ap(config-if)#
ap(config-if)#exit
ap(config)#
ap(config)#
ap(config)#exit
ap#
*Mar  1 00:34:59.025: %SYS-5-CONFIG_I: Configured from console by console

-----------------------------------------------------------------------------
BACKUP THIS CONFIGURATION TO 'StartUp-Configuration'
-----------------------------------------------------------------------------
ap#
ap#copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
ap#
ap#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
ap(config)#int d1
ap(config-if)#
ap(config-if)#do copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
ap(config-if)#exit
ap(config)#exit
ap#
ap#
ap#
ap#
*Mar  1 00:38:05.897: %SYS-5-CONFIG_I: Configured from console by console
ap#
ap#show dot11 bssid
Interface      BSSID         Guest  SSID
Dot11Radio1   b862.1f28.1dd0  Yes  Cisco_AP 5GHz
Dot11Radio0   b862.1f16.ed30  Yes  Cisco_AP
ap#
ap#show
ap#show ?
  aaa                Show AAA values
  access-expression  List access expression
  access-lists       List access lists
  accounting         Accounting data for active sessions
  aliases            Display alias commands
  archive            Archive of the running configuration information
  arp                ARP table
  auto               Show Automation Template
  boot               show boot attributes
  bridge             Bridge Forwarding/Filtering Database [verbose]
  buffers            Buffer pool statistics
  call               Show call
  caller             Display information about dialup connections
  cca                CCA information
  cdp                CDP information
  class-map          Show QoS Class Map
  clock              Display the system clock
  configuration      Configuration details
  controllers        Interface controller status
  crypto             Encryption module
  dampening          Display dampening information
  data-corruption    Show data errors
  debugging          State of each debugging option
  derived-config     Derived operating configuration
  dhcp               Dynamic Host Configuration Protocol status
  dot11              IEEE 802.11 show information
  dot1x              Dot1x information
  eap                Shows EAP registration/session information
  event-manager      Event manager information
  exception          exception information
  file               Show filesystem information
  flash:             display information about flash: file system
  hardware           Hardware specific information
  history            Display the session command history
  hosts              IP domain-name, lookup style, nameservers, and host table
  html               HTML helper commands
  iapp               DDP IAPP
  idb                List of Interface Descriptor Blocks
  interfaces         Interface status and configuration
  inventory          Show the physical inventory
  ip                 IP information
  led                LED functions
  line               TTY line information
  location           Display the system location
  logging            Show the contents of logging buffers
  login              Display Secure Login Configurations and State
  memory             Memory statistics
  monitor            Monitoring different system events
  parser             Display parser information
  policy-manager     Policy Manager
  policy-map         Show QoS Policy Map
  privilege          Show current privilege level
  processes          Active process statistics
  profile            SOAP profile functions
  radius             Shows radius information
  ram:               display information about ram: file system
  region             Region Manager Status
  registry           Function registry information
  reload             Scheduled reload information
  resource           Display Resource Usage/Relations and more details
  rhosts             Remote-host+user equivalences
  rmi                Resource User Infrastructure information
  running-config     Current operating configuration
  sessions           Information about Telnet connections
  smf                Software MAC filter
  snmp               snmp statistics
  sntp               Simple network time protocol
  spanning-tree      Spanning tree topology
  spectrum           Spectrum FW show commands
  ssh                Status of SSH server connections
  ssl                Show SSL command
  stacks             Process stack utilization
  startup-config     Contents of startup configuration
  subscriber-policy  Subscriber policy
  subsys             Show subsystem information
  table-map          Show Table Map
  tacacs             Shows tacacs+ server statistics
  tcp                Status of TCP connections
  tech-support       Show system information for Tech-Support
  template           Template information
  terminal           Display terminal configuration parameters
  time-range         Time range
  trace              trace information
  tunnel             Show configured tunnels
  users              Display information about terminal lines
  version            System hardware and software status
  vlans              Virtual LANs Information
  wlccp              WLCCP info

ap#show  host
ap#show  hosts ?
  WORD  Hostname for specific information
  |     Output modifiers
  <cr>

ap#show  hosts
Default domain is not set
Name/address lookup uses domain service
Name servers are 255.255.255.255

Codes: UN - unknown, EX - expired, OK - OK, ?? - revalidate
       temp - temporary, perm - permanent
       NA - Not Applicable None - Not defined

Host                      Port  Flags      Age Type   Address(es)
ap#
ap#
ap#
ap#
ap#
ap#
ap#conf term
ap#conf terminal
Enter configuration commands, one per line.  End with CNTL/Z.
ap(config)#?
Configure commands:
  aaa                         Authentication, Authorization and Accounting.
  access-list                 Add an access list entry
  alias                       Create command alias
  archive                     Archive the configuration
  arp                         Set a static ARP entry
  banner                      Define a login banner
  boot                        Boot Commands
  bridge                      Bridge Group.
  buffers                     Adjust system buffer pool parameters
  call                        Configure Call parameters
  cdp                         Global CDP configuration subcommands
  class-map                   Configure QoS Class Map
  clock                       Configure time-of-day clock
  configuration               Configuration access
  crypto                      Encryption module
  default                     Set a command to its defaults
  default-value               Default character-bits values
  define                      interface range macro definition
  do                          To run exec commands in config mode
  dot11                       IEEE 802.11 config commands
  dot1x                       IEEE 802.1X Global Configuration Commands

ap(config)#clock
ap(config)#clock ?
  initialize   Initialize system clock on restart
  save         backup of clock with NVRAM
  summer-time  Configure summer (daylight savings) time
  timezone     Configure time zone

ap(config)#se
ap(config)#se?
service

ap(config)#co
ap(config)#configuration ?
  mode  Configuration mode

ap(config)#configuration moded ?
% Unrecognized command
ap(config)#configuration mode
ap(config)#configuration mode ?
  exclusive  Configuration mode exclusive

ap(config)#configuration mode ex
ap(config)#configuration mode exclusive ?
  auto    Lock configuration mode automatically
  manual  Lock configuration mode on-demand

ap(config)#copy
ap(config)#copy ru
ap(config)#exit
ap#
ap#
ap#co
*Mar  1 00:47:54.276: %SYS-5-CONFIG_I: Configured from console by conso
ap#
ap#cop
ap#copy run
ap#copy running-config st
ap#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
ap#copy run
ap#

Verifying the results

Once programmedd, we detch the unit from thr laptop and plug it back in on the ceiling, where it will live to serve its’ purpose and powered from a Cisco SG-200 Switch with POE out put and so, no external power is needed to power our AP1142.

Since our laptop is on the same network, we fire up our browser and type in the IP address of the access-point, which is 192.168.1.200 Here’s the ‘home page’ of the AP.

We can see a brief summary of number of cliets currently connected, network information and a list of the three Network Interfaces; That is a GigabitEthernet port (connected to our Router [via the POE Switch])… and the Radio0-802.11N 2.4GHz and Radio0-802.11N 5GHz, each with unique MAC address.

Using the menu on the left hand side of the screen and navigating to the SYSTEM SOFTWARE page, we can see a number of options including Configuration files and option to load a New Startup Configuration File as well as several buttons to Reset and Restart the AP.

We can also see the Power State and the source of as eing INJECTOR_CONFIGURE_ON_SOURCE meaning it is integral to the RJ45 Gigabit interface.

And finally, the following image shows the current running firmware and version that is running on this AP as well as system Up-Time since last power-cycle.

We include the StartUp-Configuration file downloaded from the web-interface shown below and include the confi.txt file here for further study.

In this article we have shown how a commercial access point can be adopted to work in our home environment and how to adapt it for this purpose. We have configured this AP to be a part of our home-network by assigning it and IP address and setting p the three interfaces, one of which is running on POE Switch and two Radios to facilititate 2.4 and 5 GHz connection channels.

We have also taken a brief look at the web-user interface, where further optimizations and customizations can be made as well as monitoring usage and statistics on data flowing through the access-point.

Topics for further discussion

We have found that there are plenty of these units available for sale in market places like eBay and Amazon because Cisco has obviously rolledd out up to date technologies and better performance equivalanets. However, in our opinion, these ‘commercial grae’ access points are adequate for home or small business use, such as public houseses where WiFi extenders are desirable. As long as we know how to adapt and programe these, there is no reason why they should not be recycled given that their coverage and dedsignedd for large number of simulataneous connections are going to be better than most personal equipment available to us.

As we have highlighted at the beginning of this article, we have setup our Cisco AP112 in Autonomous Mode, as opposed to CAPWAP, which inherently is intended to work as part of swarms of APs and accordingly are managedd from a further separate piece of IT equipment referred to as a Controller. The CAPWAP and Autonomous vairants rely on fundamentally different firmware versions and it is not very clear from their physical appearance which they might be. Therefore, if we end up with the wrong firmware, it is necessary to re-flash with the correct firmware before we can transform it into an Autonomous unit. This transformation will be the subject of our next article as we investigate and convert one as soon as we can get hold of a copy of the Autnomous variant of the firmware needed to do this.