[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 704
  • Last Modified:

configuring Cisco Aironet 1100

I'm using the GUI to set up the Access point.  I am not familiar with the CLI for Cisco devices.

Under the Express Security Set-up I have set my SSID, numbered the VLan and checked Native Vlan, then under section 3. (Security)  I have an issue

When I enter my static 26 character WEP key and click apply I get an error message that says I must enter a 26 character key.

Any thoughts?

Thanks in advance!
0
curtconner
Asked:
curtconner
  • 4
  • 3
2 Solutions
 
greg wardCommented:
Its a lot easier to configure using the command line !
 
conf t
dot11 ssid tsunami
   authentication open
   authentication key-management wpa
   guest-mode
   wpa-psk ascii YOUR_WPA_KEY
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption mode ciphers tkip
 !
 ssid tsunami
 !
 short-slot-time
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
 station-role root
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
 bridge-group 1 spanning-disabled
 
If you have used the command line befor this should be easy.
 
Greg
0
 
curtconnerAuthor Commented:
Sorry for the late response, I just started using Cisco products and am not that familiar yes with the CLI and all the commands.

I haven't had a chance yet to test your config you suggest, however, I do have a question about the basic speed line of the code.  This aironet card is a N access point, should I include more speeds above 54.0 ???

0
 
greg wardCommented:
You wont need to change that line.

conf t                                                             <sets the router in config mode
dot11 ssid tsunami                                   <sets up the access-point ssid
  authentication open
   authentication key-management wpa
  guest-mode
  wpa-psk ascii YOUR_WPA_KEY
interface Dot11Radio0                               <enables config of the interface
no ip address
no ip route-cache
!
encryption mode ciphers tkip
 !
ssid tsunami                                         <sets up the access-point ssid
 
 The above is the only config that needs to be changed.
Greg
0
Restore individual SQL databases with ease

Veeam Explorer for Microsoft SQL Server delivers an easy-to-use, wizard-driven interface for restoring your databases from a backup. No expert SQL background required. Web interface provides a complete view of all available SQL databases to simplify the recovery of lost database

 
curtconnerAuthor Commented:
Thanks for your help!  That config, however, only turned on the G radio instead of N.  Can you assist with that?  Also, guest mode was is supposed to be enabled....but I don't know how to access the internet as a guest or advise others how to do so.

Thanks again in advance for your help.

Curtis

0
 
greg wardCommented:
To be honest i have not seen this device with a wireless n option.
How is the user authentication set up?
Do you have a seperate vlan for guest access?
 
Greg
0
 
curtconnerAuthor Commented:
I have two of these devices actually and one of them is temporarily set up wide open with the N radio enabled.

I don't have a seperate vlan for guest access.  Could you point me in the right direction.

I just realized I gave the wrong description for the AP.  The model that we have is AIP-1141N-A-K9.
0
 
greg wardCommented:
https://supportforums.cisco.com/message/3061238
This user has set up the device to use vlans on the AP, some more work needs to be done.
You would need to have a router configured with these VLAN's and something handing out the ip addresses via dhcp for the vlans.
Both vlans will need a nat to the internet.
 
Greg
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now