Convert Cisco 1142LWAP (Lightweight) to Autonomous

Posted in Wireless Networking


  • Cisco 1142 Light weight wireless access point
  • Cisco 1142 autonomous IOS
  • TFTP server
  • Computer & network cables

Browse to your Autonomous IOS and rename the IOS from c1140-k9w7-mx.124-21a.JY to c1140-k9w7-tar.default for an 1142 WAP.

Set your Workstation IP address to subnet it is fine to leave the default gateway blank. start up your TFTP server, i use TFTPD available here. Set your "Current Directory" to the directory that your autonomous ios is stored in.

Plug a network cable from your computer either directly into the WAP or into the power injector switch port. *Note if you are not using a power injector you will require a 48VDC power cable to power the access point.

If you are using a power injector you will require an additional network cable to plug in from the injector to the WAP.

Once you plug the access point into power, the status light should start flashing. press and hold the mode button on the back until the status light turns red.

Once the status light turns red you can release the mode button and the access point should begin pulling across the IOS from your TFTP server.


If you have issues use a console cable to view the CLI to see for any errors. The access point will reboot once the IOS is copied across.


Finding an Cisco lightweight AP physically using command line

Posted in Wireless Networking

To enable the controller to send commands to the access point from its CLI, enter this command

debug ap enable your_access_point_name 

To cause a specific access point to flash its LEDs for a specified number of seconds, enter this command:

debug ap command "led flash seconds" your_access_point_name 

You can enter a value between 1 and 3600 seconds for the seconds parameter.

To disable LED flashing for a specific access point, enter this command:

debug ap command "led flash disable" your_access_point_name


Configure WPA-PSK on Cisco Wireless Access Point

Posted in Wireless Networking

Recently was required to setup a basic WPA-PSK secured wireless network for a client, using a downgraded Cisco 1142 autonomous access point. See below for further details:

conf t
interface Dot11Radio1
no ip address
encryption mode ciphers tkip
authentication open
authentication key-management wpa
wpa-psk ascii 0 WPAKeyGoesHere

In this example,

The ssid is set to WIRELESS-5 on the 802.11N 5GHz interface
The WPA-PSK is set to WPAKeyGoesHere


ubiquiti nanobridge installation

Posted in Wireless Networking


Recently I purchased a pair of ubiquiti nanobridge m5's to setup a point to point wireless bridge.

The setup was simple and the webGUI was well setup to be as simple or as advanced as you like. The distance was roughly 200m, which I know the buying  the m5's was a little overkill but you never know. Anyway here is the result:

Root bridge

20120728 120416


Remote bridge

20120728 150506