Solved

Bridge 1400

Posted on 2010-09-07
5
976 Views
Last Modified: 2013-11-11
I have two Cisco Bridge 1400 Series I want to Install it and Configure .
can you help me with the configuration it's point to point setup

thanks
0
Comment
Question by:salmaalouf
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33625714
Attached is an example of a 1400 wireless bridge configuration.  The only requirements are that a bridge in Root mode and NonRoot mode must exist with the same SSID and be on the same IP subnet.  The attached documents have the pertinent information highlighted.  How long (miles) is the bridge?

Root.doc
NonRoot.doc
0
 

Author Comment

by:salmaalouf
ID: 33638956
I try it it's work now .
thanks
I want to make it more secure but doing some security protection for the birdge .
can you advice

0
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33639891
Great!  No problem. Any wireless security will function as long as the type of security and key/passphrase is the same on both of the devices.
0
 

Author Comment

by:salmaalouf
ID: 33640553
do you have any example about the security solutions
thanks
0
 
LVL 2

Accepted Solution

by:
tlobozzo earned 500 total points
ID: 33641496
Enter the http interface of the Bridge, click the "Security" link, choose Encryption Manager, select WEP Encryption, change the drop down menu to Mandatory, enter a HEX key below, and click apply.

You can use the following 128 bit HEX key generator --   http://www.andrewscompanies.com/tools/wep.asp

If you are accessing the Non Root bridge over the link from the Root bridge, then start your encryption from the outside in.  Follow the procedure above on both bridges starting with the NonRoot.  You lose connection to it until you configure the root.  The link will come back online as long as the security matches.
1400-Security.JPG
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Users will learn how resize a batch of photos from a single command in Photoshop via Photoshop's Image Processor. Open up an Image you'd like to resize in Adobe Photoshop: Adjust the image size according to your preferences. Image > Adjustments > …
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question