Solved

Cisco 2602 Autonomous AP 802.11n issue

Posted on 2015-02-04
4
231 Views
Last Modified: 2015-02-05
Hi there,

Recently, we purchased a cisco 2602i lightweight AP and manually upgrade to autonomous. When we show the radio interface on the AP, it indicates both 2.4G and 5G radio interfaces are 802.11n hardware. See message below:

507#sh interfaces dot11Radio 1
Dot11Radio1 is up, line protocol is up
  Hardware is 802.11N 5GHz Radio, address is 2834.a2b9.48e0 (bia 2834.a2b9.48e0)

We tried to connect to the AP using different client devices(laptops/mobile phones) and all devices see the wireless radio type 802.11g(on 2.4g interface) and 802.11a(on 5g interface), not 802.11n. Should I type some special commands to enable 802.11n network on that AP?

I tested different speed and channel width in the radio interface, but no one works.

Thanks in advance,
Chandler
0
Comment
Question by:rsp_it
  • 2
  • 2
4 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
Comment Utility
You can only use 802.11n with AES encryption.

Can you post your config please?
0
 

Author Comment

by:rsp_it
Comment Utility
Thanks, Craigbeck.

here are my configuration:

Current configuration : 4192 bytes
!
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname RSP-JN-2602I-507
!
!
logging rate-limit console 9
!
aaa new-model
!
!
aaa group server radius rad_eap
 server name 10.4.200.197
!
aaa authentication login eap_methods group rad_eap local
aaa authentication dot1x eap_methods group rad_eap
!
!
!
!
!
aaa session-id common
no ip cef
ip domain name test.com
ip name-server 10.4.100.11
!
!
!
!
dot11 auto-immune enable
dot11 syslog
!
dot11 ssid Test-EE
   vlan 1
   band-select
   authentication open eap eap_methods
   authentication key-management wpa version 2
   guest-mode
!
dot11 ssid Test-HR
   vlan 19
   authentication open eap eap_methods
   authentication key-management wpa
!
dot11 ssid Test-Server
   vlan 20
   authentication open eap eap_methods
   authentication key-management wpa
!
!
dot11 guest
!
eap profile eap_methods
 method mschapv2
 method peap
!
!
!        
username Cisco privilege 15 password 7 121A0C041104
!
!
ip ssh version 2
bridge irb
!
!
!
interface Dot11Radio0
 no ip address
 no ip route-cache
 !
 encryption mode ciphers tkip
 !
 encryption vlan 1 mode ciphers tkip
 !
 encryption vlan 20 mode ciphers tkip
 !
 encryption vlan 19 mode ciphers tkip
 !
 ssid Test-EE
 !
 ssid Test-HR
 !
 ssid Test-Server
 !
 antenna gain 0
 stbc
 speed  basic-1.0 basic-2.0 basic-5.5 basic-11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15. m16. m17. m18. m19. m20. m21. m22. m23.
 station-role root
 rts threshold 0
 world-mode dot11d country-code CN both
!
interface Dot11Radio0.1
 encapsulation dot1Q 1 native
 no ip route-cache
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.2
 encapsulation dot1Q 19
 no ip route-cache
 bridge-group 2
 bridge-group 2 subscriber-loop-control
 bridge-group 2 spanning-disabled
 bridge-group 2 block-unknown-source
 no bridge-group 2 source-learning
 no bridge-group 2 unicast-flooding
!
interface Dot11Radio0.3
 encapsulation dot1Q 20
 no ip route-cache
 bridge-group 3
 bridge-group 3 subscriber-loop-control
 bridge-group 3 spanning-disabled
 bridge-group 3 block-unknown-source
 no bridge-group 3 source-learning
!
interface GigabitEthernet0.3
 encapsulation dot1Q 20
 bridge-group 3
 bridge-group 3 spanning-disabled
 no bridge-group 3 source-learning
!
interface BVI1
 ip address 10.4.100.33 255.255.255.0
 no ip route-cache
!
ip default-gateway 10.4.100.1
ip forward-protocol nd
ip http server
ip http authentication local
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
!
!
radius server 10.4.200.197
 address ipv4 10.4.200.197 auth-port 1645 acct-port 1646
 key 7 120B16071B0A1F
!
bridge 1 route ip
!
!
!
line con 0
line vty 0 4
 exec-timeout 0 0
 login authentication eap_methods
 transport input ssh
!
end
0
 

Author Closing Comment

by:rsp_it
Comment Utility
I did change to AES from TKIP and it works now. Thanks fro your advise.

Regards,
Chandler
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
No probs - glad to help :-)
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This article is a step by step guide on how to create a basic PTP link using Ubiquiti airOS devices. This guide can be used on the following Ubiquiti AirMAX devices. Nanostation, Bullets, AirBridge, Nanobeam, NanoBridge to name a few. Please review …
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now