Go Premium for a chance to win a PS4. Enter to Win


Cisco Aironet 1040 Series - Standalone, with Guest Access

Posted on 2013-01-15
Medium Priority
Last Modified: 2013-03-08
Hi All,

I'm going to purchase a Cisco Aironet for a small business.  I'd really like to enable "Guest Access" so that I may provide visitors Internet access without accessing our corporate network.  Can I provide Guest Access to visitors and provide access to internal resources for their staff with one Aironet 1040 series standalone (w/o controller) ?
Question by:polaris101
  • 2
LVL 25

Expert Comment

by:Ken Boone
ID: 38779825
Yes you can but its a two part deal. Basically from the AP perspective you will have it trunked to 2 vlans.  1 being corporate users and the other being guest users. You will then have 2 SSIDs set up on the AP.  The SSID will then be mapped to the appropriate vlan. So that is what is done at the AP level.

The second part is what you need to do with the vlan/firewall setup for the "guest" network.
 At that point its up to you what you do with it.  So once you have a corporate wireless user they can get to anything because you bridged it over to the corporate vlan.  The guest vlan though typically would go straight to a port on your firewall bypassing the internal network.  Then the firewall would provide the internet access.

Author Comment

ID: 38780149
Thanks for the help.  Do you know if you have to have a RADIUS server with the 1140 series if I choose WPA for authentication ?
LVL 25

Accepted Solution

Ken Boone earned 2000 total points
ID: 38780185
If you use WPA/WPA2 enterprise then you will need a back end authentication server if you use WPA/WPA Personal then you just need to set a pre-shared key. You can do either.  You don't need radius if you are going to go with a pre shared key.

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question