Solved

Bridge 1400

Posted on 2010-09-07
5
963 Views
Last Modified: 2013-11-11
I have two Cisco Bridge 1400 Series I want to Install it and Configure .
can you help me with the configuration it's point to point setup

thanks
0
Comment
Question by:salmaalouf
  • 3
  • 2
5 Comments
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33625714
Attached is an example of a 1400 wireless bridge configuration.  The only requirements are that a bridge in Root mode and NonRoot mode must exist with the same SSID and be on the same IP subnet.  The attached documents have the pertinent information highlighted.  How long (miles) is the bridge?

Root.doc
NonRoot.doc
0
 

Author Comment

by:salmaalouf
ID: 33638956
I try it it's work now .
thanks
I want to make it more secure but doing some security protection for the birdge .
can you advice

0
 
LVL 2

Expert Comment

by:tlobozzo
ID: 33639891
Great!  No problem. Any wireless security will function as long as the type of security and key/passphrase is the same on both of the devices.
0
 

Author Comment

by:salmaalouf
ID: 33640553
do you have any example about the security solutions
thanks
0
 
LVL 2

Accepted Solution

by:
tlobozzo earned 500 total points
ID: 33641496
Enter the http interface of the Bridge, click the "Security" link, choose Encryption Manager, select WEP Encryption, change the drop down menu to Mandatory, enter a HEX key below, and click apply.

You can use the following 128 bit HEX key generator --   http://www.andrewscompanies.com/tools/wep.asp

If you are accessing the Non Root bridge over the link from the Root bridge, then start your encryption from the outside in.  Follow the procedure above on both bridges starting with the NonRoot.  You lose connection to it until you configure the root.  The link will come back online as long as the security matches.
1400-Security.JPG
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now