Solved

How to Convert Light Weight Access Point into Autonomous Access Point

Posted on 2011-09-16
4
781 Views
Last Modified: 2013-12-09
Hello All,
 Could someone advice on how to convert LWAP (Light Weight Access Point )  into Autonomous (Standalone) AP , without connecting to WLC please ?
I have gone through this  link; http://paulbeyer.wordpress.com/2010/01/16/converting-a-cisco-ap-from-lwapp-to-autonomous-mode/ , and Cisco website .
Here is my error message attached.


Thanks  
0
Comment
Question by:Davgadaze
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 36548553
Hi,

the link is perfect, so you need to download the IOS to your AP from CCO web. It is possible if you have smartnet or shared support for AP!

Best regards,
Istvan
0
 

Accepted Solution

by:
Davgadaze earned 0 total points
ID: 36549017
Yes it is okay , it was my Hyper terminal setting that cause the whole issue.
Regards,
0
 

Author Closing Comment

by:Davgadaze
ID: 37475195
no much to do
0
 

Author Comment

by:Davgadaze
ID: 37447778
It was Hardware issue
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Coaxial cable bending There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question