logging console disable                                 --> % Stopping the command
lines %
Support system diagnostics                              --> % Stopping the command
lines %
% RESETTING ACCESS POINT %
capwap erase all                                        --> % Reset AP
configurations %
% UPGRADING IOS OF ACCESSPOINT%
ap-type mobility-express tftp:// <ip of tftp server> / <IOS file name>
            --> % uploading IOS file in CAPWAP device %
archive download-sw /reload tftp://<IP>/<image file name>
      --> % uploading of image and storing it as secondary image %
archive download-sw /force-reload /overwrite tftp://<IP>/<Image file name>
      --> % Uploading of Image and Boot with secondary Image, autonomous to
Lightweight %
https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-100-
series-wireless-access-points/smb5193-upgrade-firmware-on-wireless-access-
point.html
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-5/configuration-guide/
b_cg75/b_cg75_chapter_01101001.html
Cisco Wireless Controller Configuration Guide, Release 7.5
% IP CONFIGURATION ACCESS POINT %
debug capwap console cli or debug lwapp console cli   --> % Enabling config
terminal % 702I
show capwap ip config                                 --> % Verification of Ip in
AP % 1832,
capwap ap ip <IP> <Subnet mask> <gateway>             --> % Gateway is optional
here IP of Controller and AP will be different always% 1832
Show ip int br                                        --> % Verification of Ip in
AP %
show interface summary                                --> % Interface information %
gateway address <IP>                                  --> % Gateway information %
capwap ap ip default-gateway <Next Hop Laptop or gateway>
config network webmode {enable | disable}             --> % allows users to access
the controller GUI using "http://ip-address." The default value is disabled. Web
mode is not a secure connection %
config network secureweb {enable | disable}          --> % allows users to access
the controller GUI using “https://ip-address.” The default value is enabled. Secure
web mode is a secure connection %
format flash
Show flash:
capwap ap primary-base wlc <name> and ip <Ip>        --> % For AP which is to be
connect to WLC at remote place %
ap-type capwap                                       --> % ME to CAPWAP %
% IP CONFIGURATION IN WLC %
username
password
SSID
PSK Password
The main difference is autonomous do not require a controller to control the AP and
it use WLSE for management software;
 the LWAPP(Lightweight AP) require a WLC wireless controller to control all of the
AP but provide ease of management
for the communication / setting between APs, it use another management software
call WCS.
% AP IN ROMMON MODE %
ap: set IP_ADDR
ap: set NETMASK 255.255.255.0
ap: set DEFAULT_ROUTER
ap: tftp_init
ap: ether_init
ap: flash_init
ap: tar-xtract tftp://<IP> /<filename>               -->Installing IOS file
*   setenv   ipaddr <IP of the AP>              --> 1832
*   setenv   netmask <mask>
*   setenv   gatewayip <gateway IP>
*   setenv   serverip <TFTP ip address>
* tftpboot /<image filename>
After entering the above command, we see the image getting transferred to the AP
(we used the capwap image).
Check the current partition: printenv BOOT
Set to the other partition:
            If BOOT value from above is part1: setenv BOOT part2
            The newly transferred image should be on partition 2.
Save U-Boot config/env: saveenv
Boot the board: boot
AP came out of ROMMON mode and into capwap mode and it joined a WLC, when the WLC-
triggered reset occurred, AP would reboot from part1 and would again go into uboot.
We downloaded into the AP the capwap image to match the WLC code and didn't do the
"setenv BOOT part2" command. After that, AP successfully joined the WLC and stayed
stable.
debug capwap console cli or
AP#debug lwapp console cli