Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Bridge 1400

Posted on 2010-09-07
5
Medium Priority
?
996 Views
Last Modified: 2013-11-11
I have two Cisco Bridge 1400 Series I want to Install it and Configure .
can you help me with the configuration it's point to point setup

thanks
0
Comment
Question by:salmaalouf
  • 3
  • 2
5 Comments
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33625714
Attached is an example of a 1400 wireless bridge configuration.  The only requirements are that a bridge in Root mode and NonRoot mode must exist with the same SSID and be on the same IP subnet.  The attached documents have the pertinent information highlighted.  How long (miles) is the bridge?

Root.doc
NonRoot.doc
0
 

Author Comment

by:salmaalouf
ID: 33638956
I try it it's work now .
thanks
I want to make it more secure but doing some security protection for the birdge .
can you advice

0
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33639891
Great!  No problem. Any wireless security will function as long as the type of security and key/passphrase is the same on both of the devices.
0
 

Author Comment

by:salmaalouf
ID: 33640553
do you have any example about the security solutions
thanks
0
 
LVL 2

Accepted Solution

by:
tlobozzo earned 2000 total points
ID: 33641496
Enter the http interface of the Bridge, click the "Security" link, choose Encryption Manager, select WEP Encryption, change the drop down menu to Mandatory, enter a HEX key below, and click apply.

You can use the following 128 bit HEX key generator --   http://www.andrewscompanies.com/tools/wep.asp

If you are accessing the Non Root bridge over the link from the Root bridge, then start your encryption from the outside in.  Follow the procedure above on both bridges starting with the NonRoot.  You lose connection to it until you configure the root.  The link will come back online as long as the security matches.
1400-Security.JPG
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question