UBB Store

Cisco Aironet 3802E Wireless Access Point AIR-AP3802E-B-K9 AIR-AP3802E-BK9-RF
When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network.
Cisco Aironet 3802E Wireless Access Point AIR-AP3802E-B-K9 AIR-AP3802E-BK9-RF
Price: US $50.96
Cisco Aironet 3802E Wireless Access Point AIR-AP3802E-B-K9 AIR-AP3802E-BK9-RF You Will Receive:
Cisco Aironet 3802E Wireless Access PointAIR-AP3802E-B-K9, AIR-AP3802E-BK9-RFYou Will Not Receive:AntennasAC Power AdapterAny items not photographed or specifically mentioned aboveCondition: "C5: Used Very Good"- Very Good used condition- No major marks or damges- All ports and jacks are in great shape- You may find light marks on the white panels, but nothing major- Please see the photos for more detailsProduct Functionality Description: "F3: Key Functions Working"- Powers on vial PoE Ethernet port- Console readout as appears at the bottom of the listing- Set to factory default / all passwords defaulted- Please see the photos for detailsConsole readout upon bootload:

5 ½½ÑI=5j
rºÂRÔ$êë
WË뮫
Òª)H+Ö
ÒU?®¤ë
V¡HÔë
?J5
Ñ¥½¹MM)jõ½ÑI=5é5µI U,+k?V²É¥¥
ëkÖ
ÒW­+W®$W®-V­¬X]ZË
?Jõ½ÑB?¥¹ÑÕ?²É¥¥
RkV?,,[Y²

General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.40
High speed PHY - Version: 2.0
BoardId = 0x25board SerDes lanes topology details:
| Lane # | Speed| Type 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **

U-Boot 2013.01-gcb01933d4 (Nov 10 2020 - 23:41:12) SDK version: 2015_T2.0p10

Board: Barbados-3KVE
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae360
BSS: 0x3ffefe24
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | In-Band |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 6277765 (0x005fca85)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
Loading Marvel PHY firmware...
Ethernet transceiver PHY firmware download started:
Downloading to PHY's RAM........................ 195552 of 195552 Bytes transferred. [Done]
Ethernet transceiver PHY firmware download succeeded.
Automatic Voltage setting value: 05
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2022-07-06 8:56:01 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 6276757 Bytes = 6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4202664 Bytes = 4 MiB
Image 1: 2057938 Bytes = 2 MiB
Image 2: 16137 Bytes = 15.8 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x025f87cc
Loading Multi-File Image ... OK
OK
reserving fdt memory region: addr=0 size=4000
Loading Device Tree to 01ff9000, end 01ffff08 ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1025864K/1048576K available (5743K kernel code, 411K rwdata, 2476K rodata, 359K init, 496K bss, 22712K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:01.4300] buginf tty flushing thread started, ttyport=be87c800
[01/01/1970 00:00:01.5500] m25p80 spi1.0: found mx25l3206, expected n25q032
[*01/01/1970 00:00:02.6566] buginf() enabled.
[*01/01/1970 00:00:02.6663] Made it into bootsh: Jul 6 2022 08:48:51 00:00:10.3913] bootsh mini ramfs booted to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at: Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

If you require further assistance please contact us by sending email to

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:

This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:

This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:

This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:

This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:

[*01/01/1970 00:00:32.4292] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:32.4323] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:32.4697] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[*01/01/1970 00:00:32.4728] /init: ioctl(SIOCGIFHWADDR): wired0: No such device
[ OK ] Reached target Timers.
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Created slice -.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Created slice system.slice.
[ OK ] Created slice system-sshd\x2dkeygen.slice.
[ OK ] Created slice system-serial\x2dgetty.slice.
[ OK ] Reached target Slices.
[ OK ] Listening on udev Kernel Socket.
[ OK ] Listening on udev Control Socket.
[ OK ] Reached target Sockets.
Starting udev Kernel Device Manager...
Starting udev Coldplug all Devices...
Starting Cisco UBIFS reformat/mount...
[ OK ] Started udev Kernel Device Manager.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco fips check...
Starting Cisco platform file generation...
Starting Cisco seed generation...
Starting Cisco system time setup...
[ OK ] Started Cisco system time setup.
[ OK ] Started Cisco seed generation.
[ OK ] Started Cisco fips check.
[ OK ] Started Cisco platform file generation.
Starting Cisco btldr service...
[*06/12/2020 23:59:59.0895] Last reload time: Jun 12 23:59:59 2020
[*07/06/2022 08:51:08.0003] Setting system time Wed Jul 6 08:51:08 UTC 2022
[*07/06/2022 08:51:09.0593] GCM-128 POST passed
[*07/06/2022 08:51:09.0594] GCM-256 POST passed
[ OK ] Started udev Coldplug all Devices.
[ OK ] Started Cisco btldr service.
[ OK ] Reached target Local File Systems.
Starting Cisco S10 boot service...
Starting Cisco pkg install service...
Starting Security Auditing Service...
[*07/06/2022 08:51:12.3209] parameter passed without an option given
Starting Cisco act2 check...
[ OK ] Started Cisco system time saving.
Starting Cisco system time saving...
[ OK ] Started Security Auditing Service.
[ OK ] Started Cisco pkg install service.
[07/06/2022 08:51:19.8600] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
[07/06/2022 08:51:19.9500] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
[ OK ] Started Cisco act2 check.
[07/06/2022 08:51:26.2300] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[07/06/2022 08:51:26.3100] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[** ] A start job is running for Cisco S10 boot service (22s / 1min 37s)[*07/06/2022 08:51:12.8558] MGIG Bundeled version 201, Tarball version 201
[*07/06/2022 08:51:12.9398] Identified Ethernet mGig PHY: mv2010
[*07/06/2022 08:51:15.8336]
[*07/06/2022 08:51:15.8336]
[*07/06/2022 08:51:15.8336]
[*07/06/2022 08:51:15.8336] Authenticating ACT2 ID:AP3800
[*07/06/2022 08:51:15.8336] Authenticating SN:FOC24176MFL
[*07/06/2022 08:51:15.8397]
[*07/06/2022 08:51:15.8398] (ACT2Boot) Hardware is Cisco (c) authentic :-)
[*07/06/2022 08:51:15.8398]
[*07/06/2022 08:51:15.8628] Seeding /dev/urandom from ACT2
[*07/06/2022 08:51:17.4805] Reading ACT2 SUDI certificates
[*07/06/2022 08:51:19.3520] Active version: 8.8.1.10
[*07/06/2022 08:51:19.3548] Backup version: 0.0.0.0
[*07/06/2022 08:51:19.6428] device wired0 entered promiscuous mode
[*07/06/2022 08:51:20.0365] wifi0: Initializing TX ring
[*07/06/2022 08:51:20.0447] wifi0: prepare firmware downloading
[*07/06/2022 08:51:20.8699] wifi0: Firmware downloading
[*07/06/2022 08:51:22.0909] 0;0;0;0;0;0;0;0;
[*07/06/2022 08:51:25.7969] Firmware download complete
[*07/06/2022 08:51:25.9889] wifi0: Getting HW specs. Retrying for 3
[*07/06/2022 08:51:25.9891] Mac_Init
[*07/06/2022 08:51:25.9895] Preparing to set HW specs
[*07/06/2022 08:51:25.9897] FIPS enc aes-ccmp Verified
[*07/06/2022 08:51:25.9898] FIPS dec aes-ccmp Verified
[*07/06/2022 08:51:25.9900] FIPS enc aes-ccmp-256 Verified
[*07/06/2022 08:51:25.9901] FIPS dec aes-ccmp-256 Verified
[*07/06/2022 08:51:25.9902] FIPS enc aes-gcmp Verified
[*07/06/2022 08:51:25.9903] FIPS dec aes-gcmp Verified
[*07/06/2022 08:51:25.9904] FIPS enc aes-gcmp-256 Verified
[*07/06/2022 08:51:25.9905] FIPS dec aes-gcmp-256 Verified
[*07/06/2022 08:51:26.4005] wifi1: Initializing TX ring
[*07/06/2022 08:51:26.4085] wifi1: prepare firmware downloading
[*07/06/2022 08:51:27.2276] wifi1: Firmware downloading
[ OK ] Started Cisco S10 boot service.
Starting Cisco nss 08:51:31.5949] Firmware download complete
[*07/06/2022 08:51:31.7 Starting Cisco nolan service...
Starting Cisco watchdog...
[ OK ] Started Cisco nolan service.
[ OK ] Started Cisco watchdog.
Starting Cisco nolan USB service...
[ OK ] Started Cisco nolan USB service.
[ OK ] Started Cisco pre-PoE negotiation.
Starting Cisco pre-PoE negotiation...
[ OK ] Started Cisco nss service.
Starting Cisco S15platform...
Starting Cisco Kclick...
[07/06/2022 08:51:36.5600] Disabling lock debugging due to kernel taint
[ OK ] Started Cisco S15platform.
[ OK ] Started Cisco Kclick.
Starting Cisco certificate create service...
Starting Cisco Kclick...
Starting Cisco Sku service...
[*07/06/2022 08:51:36.7774] stile module dp init successfully
[*07/06/2022 08:51:36.7774] NBA Starting Cisco ME service...
[ OK ] Started Cisco Sku service.
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco certificate create service.
[ OK ] Started Cisco Tam service.
Starting Cisco Tam service...
[*07/06/2022 08:51:40.0681] Create symlink /dev/mic_cert result 0
[*07/06/2022 08:51:40.0681] Loading certificates from storage...
[*07/06/2022 08:51:40.1023] barbados /tmp/SC4_1dbm.txt
Starting Cisco certtime service...
[ OK ] Started Cisco Kclick.
Starting Cisco S16platfomm...
Starting Cisco syslog service...
Starting rsyslog client...
[ OK ] Started Cisco S16platfomm.
[ OK ] Started Cisco syslog service.
[ OK ] Started rsyslog client.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
Starting Cisco kexec...
Starting Clean Air daemon...
Starting gRPC server daemon...
[*07/06/2022 08:51:45.4999] starting tam services using ACT2...
[*07/06/2022 08:51:45.4999]
[*07/06/2022 08:51:45.4999] TAM init done
Starting Cisco led service...
Starting AP Trace daemon...
Starting WCPD process...
Starting Hostapd process...
[ OK ] Started Serial Getty on ttyS0.
[*07/06/2022 08:51:46.5389]
[*07/06/2022 08:51:46.5389] Click sched monitor: schedulers = 1
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting Fast CGI daemon...
Starting Cisco image/firmware updater service...
[*07/06/2022 08:51:46.8926]
[*07/06/2022 08:51:46.8926] [7/6/2022 8:52:47] updt_util: PHY firmware is up to date
Starting Marvell Forwarding daemon...
Starting RSYNC User Key Generation...
Starting Cisco klogd...
Starting capwapd...
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting Cisco rtd service...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting Cisco brain service...
Starting Cisco printkd...
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco led service.
[ OK ] Started Cisco image/firmware updater service.
[ OK ] Started Cisco klogd.
[ OK ] Started Cisco printkd.
[ OK ] Started Fast CGI daemon.
[ OK ] Started AP Trace daemon.
[ OK ] Started Cisco rtd service.
[ OK ] Started Hostapd process.
[ OK ] Started Cisco brain service.
[ OK ] Started RSYNC User Key Generation.
[ OK ] Reached target sshd-keygen.target.
Starting OpenSSH server daemon...
[ OK ] Started OpenSSH server daemon.
[07/06/2022 08:51:50.1700] wired0 emac 0: link up
[07/06/2022 08:51:50.2300] wired0: link up

User Access Cisco
APAC7A.567B.B258#show version

Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:

If you require further assistance please contact us by sending email to

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:

This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:

This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:

This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:

This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:

Cisco AP Software, (ap3g3), C3802, RELEASE SOFTWARE
Technical Support: (c) 1986-2022 by Cisco Systems, Inc.
Compiled Wed Jul 6 08:51:08 GMT 2022

ROM: Bootstrap program is U-Boot boot loader
BOOTLDR: U-Boot boot loader Version 2013.01-gcb01933d4 (Nov 10 2020 - 23:41:12)

APAC7A.567B.B258 uptime is 0 days, 0 hours, 2 minutes
Last reload time : Fri Jun 12 23:59:59 UTC 2020
Last reload reason : unknown

cisco AIR-AP3802E-B-K9 ARMv7 Processor rev 1 (v7l) with 1028224/575216K bytes of memory.
Processor board ID FJC2424M9CX
AP Running Image : 8.8.1.10
Primary Boot Image : 8.8.1.10
Backup Boot Image : 0.0.0.0
Primary Boot Image Hash:
Backup Boot Image Hash:
1 Multigigabit Ethernet interfaces
1 Gigabit Ethernet interfaces
2 802.11 Radios
Radio Driver version : 9.0.5.5-W8964
Radio FW version : 9.1.8.1
NSS FW version : 2.4.28

Base ethernet MAC Address : AC:7A:56:7B:B2:58
Part Number : 0-000000-00
PCA Assembly Number : 800-105812-01
PCA Revision Number : B0
PCB Serial Number : FOC24176MFL
Top Assembly Part Number : 800-105812-01
Top Assembly Serial Number : FJC2424M9CX
Top Revision Number : C0
Product/Model Number : AIR-AP3802E-B-K9

Avritek is R2v3 certified. This item has been evaluated for condition and function in accordance with R2v3 requirements.30-Day Warranty!



    Buy Now