Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Cisco Access Point Configuration Problem

Posted on 2007-03-29
4
Medium Priority
?
208 Views
Last Modified: 2013-11-09
I have 4 Cisco 1242ag access points, 1 is the broadcast unit setup as a root bridge with wireless clients running a local vlan, 2 are setup as work group bridges with pc's connected via the ethernet port and 1 setup as a repeater(all those work great).  The problem: I am adding a 1242ag that will connect via the repeater, I have set it up exactly like the other 2 workgroup bridges and it is not authenticating.  Thoughts?
0
Comment
Question by:Rob Timmermans
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:jekl2000
ID: 18822932
I'm guessing that it authenticates without the repeater in the middle....correct?
0
 

Author Comment

by:Rob Timmermans
ID: 18823217
Yes.  It authenticates at the broadcast unit.  I trieg again this morning with a different antenna, didn't work.  Then I brought to an area it could directly connect to the broadcast unit w/o the repeater and it connected just fine, so something with the repater and this new ap config are working together.  I am able to take my laptop and connect just fine via the repeater.
0
 

Author Comment

by:Rob Timmermans
ID: 18823329
I got it, I had to add the repeaters mac to the root parent authentication list of the new ap.
0
 
LVL 11

Accepted Solution

by:
jekl2000 earned 2000 total points
ID: 18823380
Great.....
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is split into background info to start and actual review at bottom: Some time ago I wanted to sell a system with both wired and wireless capability but at minimum expense.  Having visited my trusted online auction I was pleasantly su…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question