Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Bridge 1400

Posted on 2010-09-07
5
972 Views
Last Modified: 2013-11-11
I have two Cisco Bridge 1400 Series I want to Install it and Configure .
can you help me with the configuration it's point to point setup

thanks
0
Comment
Question by:salmaalouf
  • 3
  • 2
5 Comments
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33625714
Attached is an example of a 1400 wireless bridge configuration.  The only requirements are that a bridge in Root mode and NonRoot mode must exist with the same SSID and be on the same IP subnet.  The attached documents have the pertinent information highlighted.  How long (miles) is the bridge?

Root.doc
NonRoot.doc
0
 

Author Comment

by:salmaalouf
ID: 33638956
I try it it's work now .
thanks
I want to make it more secure but doing some security protection for the birdge .
can you advice

0
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33639891
Great!  No problem. Any wireless security will function as long as the type of security and key/passphrase is the same on both of the devices.
0
 

Author Comment

by:salmaalouf
ID: 33640553
do you have any example about the security solutions
thanks
0
 
LVL 2

Accepted Solution

by:
tlobozzo earned 500 total points
ID: 33641496
Enter the http interface of the Bridge, click the "Security" link, choose Encryption Manager, select WEP Encryption, change the drop down menu to Mandatory, enter a HEX key below, and click apply.

You can use the following 128 bit HEX key generator --   http://www.andrewscompanies.com/tools/wep.asp

If you are accessing the Non Root bridge over the link from the Root bridge, then start your encryption from the outside in.  Follow the procedure above on both bridges starting with the NonRoot.  You lose connection to it until you configure the root.  The link will come back online as long as the security matches.
1400-Security.JPG
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Users will learn how to set proper sequence settings, scale images, paste attributes, add transitions, fades, and music. Open up Final Cut Pro 7 and Create a new Project: Set the Sequence Settings. a) Click File > Easy Setup > Format > Apple ProRe…
CodeTwo Sync for iCloud (http://www.codetwo.com/sync-for-icloud?sts=6554) automatically synchronizes your Outlook 2016, 2013, 2010 or 2007 folders with iCloud folders available via iCloud Control Panel. This lets you automatically sync them with…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question