Solved

Bridge 1400

Posted on 2010-09-07
5
973 Views
Last Modified: 2013-11-11
I have two Cisco Bridge 1400 Series I want to Install it and Configure .
can you help me with the configuration it's point to point setup

thanks
0
Comment
Question by:salmaalouf
  • 3
  • 2
5 Comments
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33625714
Attached is an example of a 1400 wireless bridge configuration.  The only requirements are that a bridge in Root mode and NonRoot mode must exist with the same SSID and be on the same IP subnet.  The attached documents have the pertinent information highlighted.  How long (miles) is the bridge?

Root.doc
NonRoot.doc
0
 

Author Comment

by:salmaalouf
ID: 33638956
I try it it's work now .
thanks
I want to make it more secure but doing some security protection for the birdge .
can you advice

0
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33639891
Great!  No problem. Any wireless security will function as long as the type of security and key/passphrase is the same on both of the devices.
0
 

Author Comment

by:salmaalouf
ID: 33640553
do you have any example about the security solutions
thanks
0
 
LVL 2

Accepted Solution

by:
tlobozzo earned 500 total points
ID: 33641496
Enter the http interface of the Bridge, click the "Security" link, choose Encryption Manager, select WEP Encryption, change the drop down menu to Mandatory, enter a HEX key below, and click apply.

You can use the following 128 bit HEX key generator --   http://www.andrewscompanies.com/tools/wep.asp

If you are accessing the Non Root bridge over the link from the Root bridge, then start your encryption from the outside in.  Follow the procedure above on both bridges starting with the NonRoot.  You lose connection to it until you configure the root.  The link will come back online as long as the security matches.
1400-Security.JPG
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
CodeTwo Sync for iCloud (http://www.codetwo.com/sync-for-icloud?sts=6554) automatically synchronizes your Outlook 2016, 2013, 2010 or 2007 folders with iCloud folders available via iCloud Control Panel. This lets you automatically sync them with…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question