Solved

Cisco Access Points AP541N - end of life?

Posted on 2014-03-28
4
312 Views
Last Modified: 2015-06-14
Hi,

I have a site running about 12 Cisco Small Business Pro 500 (AP541n) access points. They run in clustering mode without a controller which makes management very easy.

I need to expand the site but the AP541n is now end of life. Anyone know the replacement that will work with the existing clustering without having to change all of my kit?

Many thanks!
0
Comment
Question by:alexbuckland1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 39961810
0
 

Author Comment

by:alexbuckland1
ID: 39962956
Great thanks, will it work with the other units - i.e stay in sync with their cluster?
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 39963573
It'll talk to other WAP551's but if you mean will it talk to older 541's the honest answer is I don't know.

It should do though. I believe it uses the same management protocol.
0
 

Author Comment

by:alexbuckland1
ID: 39964236
Thanks.
I have ordered some, I will test Monday.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses
Course of the Month8 days, 9 hours left to enroll

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question