[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Cisco 2602 Autonomous AP 802.11n issue

Posted on 2015-02-04
4
Medium Priority
?
280 Views
Last Modified: 2015-02-05
Hi there,

Recently, we purchased a cisco 2602i lightweight AP and manually upgrade to autonomous. When we show the radio interface on the AP, it indicates both 2.4G and 5G radio interfaces are 802.11n hardware. See message below:

507#sh interfaces dot11Radio 1
Dot11Radio1 is up, line protocol is up
  Hardware is 802.11N 5GHz Radio, address is 2834.a2b9.48e0 (bia 2834.a2b9.48e0)

We tried to connect to the AP using different client devices(laptops/mobile phones) and all devices see the wireless radio type 802.11g(on 2.4g interface) and 802.11a(on 5g interface), not 802.11n. Should I type some special commands to enable 802.11n network on that AP?

I tested different speed and channel width in the radio interface, but no one works.

Thanks in advance,
Chandler
0
Comment
Question by:rsp_it
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 2000 total points
ID: 40588346
You can only use 802.11n with AES encryption.

Can you post your config please?
0
 

Author Comment

by:rsp_it
ID: 40590187
Thanks, Craigbeck.

here are my configuration:

Current configuration : 4192 bytes
!
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RSP-JN-2602I-507
!
!
logging rate-limit console 9
!
aaa new-model
!
!
aaa group server radius rad_eap
 server name 10.4.200.197
!
aaa authentication login eap_methods group rad_eap local
aaa authentication dot1x eap_methods group rad_eap
!
!
!
!
!
aaa session-id common
no ip cef
ip domain name test.com
ip name-server 10.4.100.11
!
!
!
!
dot11 auto-immune enable
dot11 syslog
!
dot11 ssid Test-EE
   vlan 1
   band-select
   authentication open eap eap_methods
   authentication key-management wpa version 2
   guest-mode
!
dot11 ssid Test-HR
   vlan 19
   authentication open eap eap_methods
   authentication key-management wpa
!
dot11 ssid Test-Server
   vlan 20
   authentication open eap eap_methods
   authentication key-management wpa
!
!
dot11 guest
!
eap profile eap_methods
 method mschapv2
 method peap
!
!
!        
username Cisco privilege 15 password 7 121A0C041104
!
!
ip ssh version 2
bridge irb
!
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption mode ciphers tkip
 !
 encryption vlan 1 mode ciphers tkip
 !
 encryption vlan 20 mode ciphers tkip
 !
 encryption vlan 19 mode ciphers tkip
 !
 ssid Test-EE
 !
 ssid Test-HR
 !
 ssid Test-Server
 !
 antenna gain 0
 stbc
 speed  basic-1.0 basic-2.0 basic-5.5 basic-11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15. m16. m17. m18. m19. m20. m21. m22. m23.
 station-role root
 rts threshold 0
 world-mode dot11d country-code CN both
!
interface Dot11Radio0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.2
 encapsulation dot1Q 19
 no ip route-cache
 bridge-group 2
 bridge-group 2 subscriber-loop-control
 bridge-group 2 spanning-disabled
 bridge-group 2 block-unknown-source
 no bridge-group 2 source-learning
 no bridge-group 2 unicast-flooding
!
interface Dot11Radio0.3
 encapsulation dot1Q 20
 no ip route-cache
 bridge-group 3
 bridge-group 3 subscriber-loop-control
 bridge-group 3 spanning-disabled
 bridge-group 3 block-unknown-source
 no bridge-group 3 source-learning
!
interface GigabitEthernet0.3
 encapsulation dot1Q 20
 bridge-group 3
 bridge-group 3 spanning-disabled
 no bridge-group 3 source-learning
!
interface BVI1
 ip address 10.4.100.33 255.255.255.0
 no ip route-cache
!
ip default-gateway 10.4.100.1
ip forward-protocol nd
ip http server
ip http authentication local
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
!
!
radius server 10.4.200.197
 address ipv4 10.4.200.197 auth-port 1645 acct-port 1646
 key 7 120B16071B0A1F
!
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
 exec-timeout 0 0
 login authentication eap_methods
 transport input ssh
!
end
0
 

Author Closing Comment

by:rsp_it
ID: 40590194
I did change to AES from TKIP and it works now. Thanks fro your advise.

Regards,
Chandler
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 40590976
No probs - glad to help :-)
0

Featured Post

Fill in the form and get your FREE NFR key NOW!

Veeam® is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Coaxial cable bending There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the…
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question