Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cisco 5508 wireless controller console cable

Posted on 2011-09-20
2
Medium Priority
?
864 Views
Last Modified: 2012-05-12
What type of cable is needed to use the RJ-45 console port on the Cisco 5500 series wireless controllers. The Hardware Installation guide mentions a null modem serial cable, which would be the same as the older 4400 series. The 2100 series uses the standard blue Cisco console cable, so I'm not sure what will be needed for the 5500 series.
Also, if connecting a laptop to one of the gig interfaces, does the laptop card have to be a gig card?
0
Comment
Question by:dogdaypm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 1000 total points
ID: 36572739
You can use the standard blue Cisco Serial-RJ45 cable.  The one that comes with any Cisco switch or the older 4400 WLC will work fine.
0
 

Author Closing Comment

by:dogdaypm
ID: 36574750
Thank you!
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question