Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

deauth deassoc signals on Cisco Wireless Controller 2504

Posted on 2014-07-30
1
Medium Priority
?
326 Views
Last Modified: 2014-08-14
our landlord is complaining the some of the tenants wireless signals are interfering with other, i have a Cisco Controller 2504. is there a setting on the controller to verify how far our AP signal goes?
0
Comment
Question by:NxJNY
1 Comment
 
LVL 20

Accepted Solution

by:
rauenpc earned 1500 total points
ID: 40230220
There is no setting that will say "the signal goes 100 feet", but you do have control over the power settings on the radios. Without performing a proper wireless survey, I have no direction to give you terms of how to adjust the power settings. Setting it too low could give you dead spots in your office, and setting it too high could be the cause of the complaints. By default the profile allows for maximum power.
2504-TxPower.jpg
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question