Cisco Aironet 1400 Series Wireless Bridge
Software Configuration Guide
Cisco IOS Release 12.2(11)JA
June 2003
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-4059-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, CCSI, Cisco Eos, Cisco Explorer, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase,
Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco TrustSec, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip
Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work,
Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, Flip Gift Card, and One Million Acts of Green are service marks; and
Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the
Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker, iLYNX, IOS, iPhone, IronPort, the
IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY,
PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are
registered trademarks of Cisco and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1002R)
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
iii
Contents
Protecting Your Wireless LAN2-8
Using the IP Setup Utility2-8
Obtaining and Installing IPSU2-9
Using IPSU to Find the Bridge’s IP Address2-9
Using IPSU to Set the Bridge’s IP Address and SSID2-10
Assigning an IP Address Using the CLI2-11
Using a Telnet Session to Access the CLI2-12
CHAPTER
CHAPTER
3Using the Web-Browser Interface3-1
Using the Web-Browser Interface for the First Time3-2
Using the Management Pages in the Web-Browser Interface3-2
Using Action Buttons3-3
Character Restrictions in Entry Fields3-4
Using Online Help3-5
4Using the Command-Line Interface4-1
IOS Command Modes4-2
Getting Help4-3
Abbreviating Commands4-3
Using no and default Forms of Commands4-3
Understanding CLI Messages4-4
Using Command History4-4
Changing the Command History Buffer Size4-4
Recalling Commands4-5
Disabling the Command History Feature4-5
Using Editing Features4-5
Enabling and Disabling Editing Features4-6
Editing Commands Through Keystrokes4-6
Editing Command Lines that Wrap4-7
Searching and Filtering Output of show and more Commands4-8
Accessing the CLI4-8
Opening the CLI with Telnet4-8
Opening the CLI with Secure Shell4-9
CHAPTER
5Administering the Bridge5-1
Preventing Unauthorized Access to Your Bridge5-2
Protecting Access to Privileged EXEC Commands5-2
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
iv
OL-4059-01
Default Password and Privilege Level Configuration5-2
Setting or Changing a Static Enable Password5-3
Protecting Enable and Enable Secret Passwords with Encryption5-4
Configuring Username and Password Pairs5-5
Configuring Multiple Privilege Levels5-6
Setting the Privilege Level for a Command5-6
Logging Into and Exiting a Privilege Level5-7
Controlling Bridge Access with RADIUS5-7
Default RADIUS Configuration5-8
Configuring RADIUS Login Authentication5-8
Defining AAA Server Groups5-9
Configuring RADIUS Authorization for User Privileged Access and Network Services5-11
Displaying the RADIUS Configuration5-12
Controlling Bridge Access with TACACS+5-12
Default TACACS+ Configuration5-13
Configuring TACACS+ Login Authentication5-13
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services5-14
Displaying the TACACS+ Configuration5-15
Contents
Configuring the Bridge for Local Authentication and Authorization5-15
Configuring the Bridge for Secure Shell5-16
Understanding SSH5-16
Configuring SSH5-17
Managing the System Time and Date5-17
Understanding the System Clock 5-17
Understanding Network Time Protocol5-18
Configuring NTP5-19
Default NTP Configuration5-20
Configuring NTP Authentication5-20
Configuring NTP Associations5-21
Configuring NTP Broadcast Service5-22
Configuring NTP Access Restrictions5-23
Configuring the Source IP Address for NTP Packets5-25
Displaying the NTP Configuration5-26
Configuring Time and Date Manually5-26
Setting the System Clock5-27
Displaying the Time and Date Configuration5-27
Configuring the Time Zone 5-28
Configuring Summer Time (Daylight Saving Time)5-29
Configuring a System Name and Prompt5-31
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
v
Contents
Default System Name and Prompt Configuration5-31
Configuring a System Name5-31
Understanding DNS5-32
Default DNS Configuration5-32
Setting Up DNS5-32
Displaying the DNS Configuration5-33
Creating a Banner5-33
Default Banner Configuration5-34
Configuring a Message-of-the-Day Login Banner5-34
Configuring a Login Banner5-35
CHAPTER
CHAPTER
6Configuring Radio Settings6-1
Disabling and Enabling the Radio Interface6-2
Configuring the Role in Radio Network6-2
Configuring the Radio Distance Setting6-3
Configuring Radio Data Rates6-3
Configuring Radio Transmit Power6-4
Configuring Radio Channel Settings6-5
Disabling and Enabling Aironet Extensions6-6
Configuring the Ethernet Encapsulation Transformation Method6-6
Configuring the Beacon Period6-6
Configuring RTS Threshold and Retries6-7
Configuring the Maximum Data Retries6-7
Configuring the Fragmentation Threshold6-8
Configuring Packet Concatenation6-8
Performing a Carrier Busy Test6-9
7Configuring SSIDs7-1
Understanding SSIDs7-2
Configuring the SSID7-2
Default SSID Configuration7-2
Creating an SSID7-3
CHAPTER
8Configuring Spanning Tree Protocol8-1
Understanding Spanning Tree Protocol8-2
STP Overview8-2
Bridge Protocol Data Units8-3
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
vi
OL-4059-01
Election of the Spanning-Tree Root8-4
Spanning-Tree Timers8-4
Creating the Spanning-Tree Topology8-4
Spanning-Tree Interface States8-5
Root Bridge Without VLANs8-9
Non-Root Bridge Without VLANs8-10
Root Bridge with VLANs8-11
Non-Root Bridge with VLANs8-12
Contents
CHAPTER
CHAPTER
Displaying Spanning-Tree Status8-14
9Configuring WEP and WEP Features9-1
Understanding WEP9-2
Configuring WEP and WEP Features9-2
Creating WEP Keys9-2
Enabling and Disabling WEP and Enabling TKIP and MIC9-3
10Configuring Authentication Types10-1
Understanding Authentication Types10-2
Open Authentication to the Bridge10-2
Shared Key Authentication to the Bridge10-2
EAP Authentication to the Network10-3
Configuring Authentication Types10-5
Default Authentication Settings10-5
Assigning Authentication Types to an SSID10-5
Configuring Authentication Holdoffs, Timeouts, and Intervals10-7
Setting Up a Non-Root Bridge as a LEAP Client10-8
Matching Authentication Types on Root and Non-Root Bridges10-8
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
Default RADIUS Configuration11-4
Identifying the RADIUS Server Host 11-4
Configuring RADIUS Login Authentication11-7
Defining AAA Server Groups11-9
Configuring RADIUS Authorization for User Privileged Access and Network Services11-11
Starting RADIUS Accounting11-12
Configuring Settings for All RADIUS Servers11-13
Configuring the Bridge to Use Vendor-Specific RADIUS Attributes11-13
Configuring the Bridge for Vendor-Proprietary RADIUS Server Communication11-14
Default TACACS+ Configuration11-18
Identifying the TACACS+ Server Host and Setting the Authentication Key11-18
Configuring TACACS+ Login Authentication11-19
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services11-20
Starting TACACS+ Accounting11-21
Displaying the TACACS+ Configuration11-22
CHAPTER
12Configuring VLANs12-1
Understanding VLANs12-2
Related Documents12-3
Incorporating Wireless Bridges into VLANs12-4
Configuring VLANs12-4
Configuring a VLAN12-4
Viewing VLANs Configured on the Bridge12-7
CHAPTER
13Configuring QoS13-1
Understanding QoS for Wireless LANs13-2
QoS for Wireless LANs Versus QoS on Wired LANs13-2
Impact of QoS on a Wireless LAN13-2
Precedence of QoS Settings13-3
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
viii
OL-4059-01
Configuring QoS13-3
Configuration Guidelines13-3
Configuring QoS Using the Web-Browser Interface13-4
Adjusting Radio Traffic Class Definitions13-8
CW-min and CW-max Settings for Point-to-Point and Point-to-Multipoint Bridge Links13-9
QoS Configuration Examples13-10
Giving Priority to Voice Traffic13-10
Giving Priority to Video Traffic13-12
Contents
CHAPTER
CHAPTER
14Configuring Filters14-1
Understanding Filters14-2
Configuring Filters Using the CLI14-2
Configuring Filters Using the Web-Browser Interface14-2
Configuring and Enabling MAC Address Filters14-3
Creating a MAC Address Filter14-4
Configuring and Enabling IP Filters14-5
Creating an IP Filter14-7
Configuring and Enabling Ethertype Filters14-8
Creating an Ethertype Filter14-9
15Configuring CDP15-1
Understanding CDP15-2
Configuring CDP15-2
Default CDP Configuration15-2
Configuring the CDP Characteristics15-3
Disabling and Enabling CDP15-3
Disabling and Enabling CDP on an Interface15-4
Monitoring and Maintaining CDP15-5
CHAPTER
16Configuring SNMP16-1
Understanding SNMP16-2
SNMP Versions16-2
SNMP Manager Functions16-3
SNMP Agent Functions16-3
SNMP Community Strings16-3
Using SNMP to Access MIB Variables 16-4
Configuring SNMP16-4
Default SNMP Configuration16-5
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
ix
Contents
Enabling the SNMP Agent16-5
Configuring Community Strings16-5
Configuring Trap Managers and Enabling Traps16-7
Setting the Agent Contact and Location Information16-9
Using the snmp-server view Command16-9
SNMP Examples16-9
Displaying SNMP Status16-10
CHAPTER
17Managing Firmware and Configurations17-1
Working with the Flash File System17-2
Displaying Available File Systems17-2
Setting the Default File System17-3
Displaying Information About Files on a File System17-3
Changing Directories and Displaying the Working Directory17-4
Creating and Removing Directories17-4
Copying Files17-5
Deleting Files17-5
Creating, Displaying, and Extracting tar Files17-6
Creating a tar File17-6
Displaying the Contents of a tar File17-7
Extracting a tar File17-7
Displaying the Contents of a File17-8
Working with Configuration Files17-8
Guidelines for Creating and Using Configuration Files17-9
Configuration File Types and Location17-9
Creating a Configuration File by Using a Text Editor17-10
Copying Configuration Files by Using TFTP17-10
Preparing to Download or Upload a Configuration File by Using TFTP17-10
Downloading the Configuration File by Using TFTP17-11
Uploading the Configuration File by Using TFTP17-11
Copying Configuration Files by Using FTP17-12
Preparing to Download or Upload a Configuration File by Using FTP17-13
Downloading a Configuration File by Using FTP17-13
Uploading a Configuration File by Using FTP17-14
Copying Configuration Files by Using RCP17-15
Preparing to Download or Upload a Configuration File by Using RCP17-16
Downloading a Configuration File by Using RCP17-16
Uploading a Configuration File by Using RCP17-17
Clearing Configuration Information17-18
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
x
OL-4059-01
Deleting a Stored Configuration File17-18
Working with Software Images17-19
Image Location on the Bridge17-19
tar File Format of Images on a Server or Cisco.com17-19
Copying Image Files by Using TFTP17-20
Preparing to Download or Upload an Image File by Using TFTP17-20
Downloading an Image File by Using TFTP17-21
Uploading an Image File by Using TFTP17-22
Copying Image Files by Using FTP17-23
Preparing to Download or Upload an Image File by Using FTP17-23
Downloading an Image File by Using FTP17-24
Uploading an Image File by Using FTP17-26
Copying Image Files by Using RCP17-27
Preparing to Download or Upload an Image File by Using RCP17-27
Downloading an Image File by Using RCP17-29
Uploading an Image File by Using RCP17-31
Reloading the Image Using the Web Browser Interface17-32
Reloading the Image Using the Power Injector MODE button17-33
Contents
CHAPTER
18Configuring System Message Logging18-1
Understanding System Message Logging18-2
Configuring System Message Logging18-2
System Log Message Format18-2
Default System Message Logging Configuration18-3
Disabling and Enabling Message Logging18-4
Setting the Message Display Destination Device18-5
Enabling and Disabling Timestamps on Log Messages18-6
Enabling and Disabling Sequence Numbers in Log Messages18-6
Defining the Message Severity Level18-7
Limiting Syslog Messages Sent to the History Table and to SNMP18-8
Setting a Logging Rate Limit18-9
Configuring UNIX Syslog Servers18-10
Logging Messages to a UNIX Syslog Daemon18-10
Configuring the UNIX System Logging Facility18-10
Displaying the Logging Configuration18-12
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xi
Contents
CHAPTER
19Troubleshooting19-1
Checking the Bridge LEDs19-2
Bridge Normal Mode LED Indications19-3
Power Injector LEDs19-4
Checking Power19-6
Checking Basic Configuration Settings19-7
SSID19-7
Security Settings19-7
Antenna Alignment19-8
Resetting to the Default Configuration19-8
Using the MODE Button19-8
Using the Web Browser Interface19-9
Reloading the Bridge Image19-9
Using the MODE button19-9
Web Browser Interface19-10
Browser HTTP Interface19-10
Browser TFTP Interface19-11
Obtaining the Bridge Image File19-11
Obtaining the TFTP Server Software19-12
APPENDIX
APPENDIX
APPENDIX
APPENDIX
G
LOSSARY
I
NDEX
AChannels and Antenna SettingsA-1
ChannelsA-2
IEEE 802.11a (5-GHz Band)A-2
Maximum Power LevelsA-2
5.8-GHz BandA-2
BProtocol FiltersB-1
CSupported MIBsC-1
MIB ListC-1
Using FTP to Access the MIB FilesC-2
DError and Event MessagesD-1
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xii
OL-4059-01
Audience
Purpose
Preface
This guide is for the networking professional who installs and manages Cisco Aironet 1400 Series
Bridges. To use this guide, you should have experience working with the Cisco IOS and be familiar with
the concepts and terminology of wireless local area networks.
This guide provides the information you need to install and configure your bridge. This guide provides
procedures for using the IOS commands that have been created or changed for use with the bridge. It
does not provide detailed information about these commands. For detailed information about these
commands, refer to the Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges for
this release. For information about the standard IOS Release 12.2 commands, refer to the IOS
documentation set available from the Cisco.com home page at Service and Support > TechnicalDocuments. On the Cisco Product Documentation home page, select Release 12.2 from the
Cisco IOS Software drop-down list.
This guide also includes an overview of the bridge web-based interface, which contains all the
funtionality of the command-line interface (CLI). This guide does not provide field-level descriptions of
the web-based windows nor does it provide the procedures for configuring the bridge from the
web-based interface. For all window descriptions and procedures, refer to the bridge online help, which
is available from the Help buttons on the web-based interface pages.
Organization
This guide is organized into these chapters:
Chapter 1, “Overview,” lists the software and hardware features of the bridge and describes the bridge’s
role in your network.
Chapter 2, “Configuring the Bridge for the First Time,” describes how to configure basic settings on a
new bridge.
Chapter 3, “Using the Web-Browser Interface,” describes how to use the web-browser interface to
configure the bridge.
Chapter 4, “Using the Command-Line Interface,” describes how to use the command-line interface (CLI)
to configure the bridge.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xiii
Organization
Preface
Chapter 5, “Administering the Bridge,” describes how to perform one-time operations to administer your
bridge, such as preventing unauthorized access to the bridge, setting the system date and time, and
setting the system name and prompt.
Chapter 6, “Configuring Radio Settings,” describes how to configure settings for the bridge radio such
as the role in the radio network, data rates, transmit power, channel settings, and others.
Chapter 7, “Configuring SSIDs,” describes how to configure and manage multiple service set identifiers
(SSIDs) on your bridge. You can configure up to 16 SSIDs on your bridge and assign different
configuration settings to each SSID.
Chapter 8, “Configuring Spanning Tree Protocol,” descibes how to configure Spanning Tree Protocol
(STP) on your bridge. STP prevents bridge loops in your network.
Chapter 9, “Configuring WEP and WEP Features,” describes how to configure the cipher suites required
to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including
MIC, CMIC, TKIP, CKIP, and broadcast key rotation.
Chapter 10, “Configuring Authentication Types,” describes how to configure authentication types on the
bridge. Client devices use these authentication methods to join your network.
Chapter 11, “Configuring RADIUS and TACACS+ Servers,” describes how to enable and configure the
Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control
System Plus (TACACS+), which provide detailed accounting information and flexible administrative
control over authentication and authorization processes.
Chapter 12, “Configuring VLANs,” describes how to configure your bridge to interoperate with the
VLANs set up on your wired LAN.
Chapter 13, “Configuring QoS,” describes how to configure quality of service (QoS) on your bridge.
With this feature, you can provide preferential treatment to certain traffic at the expense of others.
Chapter 14, “Configuring Filters,” describes how to configure and manage MAC address, IP, and
Ethertype filters on the bridge using the web-browser interface.
Chapter 15, “Configuring CDP,” describes how to configure Cisco Discovery Protocol (CDP) on your
bridge. CDP is a device-discovery protocol that runs on all Cisco network equipment.
Chapter 16, “Configuring SNMP,” describes how to configure the Simple Network Management
Protocol (SNMP) on your bridge.
Chapter 17, “Managing Firmware and Configurations,” describes how to manipulate the Flash file
system, how to copy configuration files, and how to archive (upload and download) software images.
Chapter 18, “Configuring System Message Logging,” describes how to configure system message
logging on your bridge.
Chapter 19, “Troubleshooting,” describes how to troubleshoot common problems with your bridge.
Appendix A, “Channels and Antenna Settings,” lists the bridge radio channels and the maximum power
levels supported by the world’s regulatory domains.
Appendix B, “Protocol Filters,” lists some of the protocols that you can filter on the bridge.
Information Bases (MIBs) that the bridge supports for this software release.
Appendix D, “Error and Event Messages,” lists the CLI error and event messages and provides an
explanation and recommended action for each message.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xiv
OL-4059-01
Preface
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and timesavers use these conventions and symbols:
Conventions
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
• Square brackets ([ ]) mean optional elements.
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
• Terminal sessions and system displays are in screen font.
• Information you enter is in boldface screen font.
• Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
TipMeans the following will help you solve a problem. The tips information might not be troubleshooting
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
CautionMeans reader be careful. In this situation, you might do something that could result equipment damage
Warning
Waarschuwing
or even an action, but could be useful information.
this manual.
or loss of data.
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar
with standard practices for preventing accidents. (To see translations of the warnings that appear
in this publication, refer to the appendix “Translated Safety Warnings.”)
Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan
veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij
elektrische schakelingen betrokken risico’s en dient u op de hoogte te zijn van standaard
maatregelen om ongelukken te voorkomen. (Voor vertalingen van de waarschuwingen die in deze
publicatie verschijnen, kunt u het aanhangsel “Translated Safety Warnings” (Vertalingen van
veiligheidsvoorschriften) raadplegen.)
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xv
Conventions
Preface
Varoitus
Attention
Warnung
Avvertenza
Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen
kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja
tavanomaisista onnettomuuksien ehkäisykeinoista. (Tässä julkaisussa esiintyvien varoitusten
käännökset löydät liitteestä "Translated Safety Warnings" (käännetyt turvallisuutta koskevat
varoitukset).)
Ce symbole d’avertissement indique un danger. Vous vous trouvez dans une situation pouvant
entraîner des blessures. Avant d’accéder à cet équipement, soyez conscient des dangers posés par
les circuits électriques et familiarisez-vous avec les procédures courantes de prévention des
accidents. Pour obtenir les traductions des mises en garde figurant dans cette publication, veuillez
consulter l’annexe intitulée « Translated Safety Warnings » (Traduction des avis de sécurité).
Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer
Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie
sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur
Vermeidung von Unfällen bewußt. (Übersetzungen der in dieser Veröffentlichung enthaltenen
Warnhinweise finden Sie im Anhang mit dem Titel “Translated Safety Warnings” (Übersetzung der
Warnhinweise).)
Questo simbolo di avvertenza indica un pericolo. Si è in una situazione che può causare infortuni.
Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti
elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione
delle avvertenze riportate in questa pubblicazione si trova nell’appendice, “Translated Safety
Warnings” (Traduzione delle avvertenze di sicurezza).
Advarsel
Aviso
¡Advertencia!
Varning!
Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du
utfører arbeid på utstyr, må du være oppmerksom på de faremomentene som elektriske kretser
innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. (Hvis du vil se
oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i vedlegget "Translated
Safety Warnings" [Oversatte sikkerhetsadvarsler].)
Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos
fisicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos
relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir
possíveis acidentes. (Para ver as traduções dos avisos que constam desta publicação, consulte o
apêndice “Translated Safety Warnings” - “Traduções dos Avisos de Segurança”).
Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular
cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los
procedimientos estándar de prevención de accidentes. (Para ver traducciones de las advertencias
que aparecen en esta publicación, consultar el apéndice titulado “Translated Safety Warnings.”)
Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada.
Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och
känna till vanligt förfarande för att förebygga skador. (Se förklaringar av de varningar som
förekommer i denna publikation i appendix "Translated Safety Warnings" [Översatta
säkerhetsvarningar].)
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xvi
OL-4059-01
Preface
Related Publications
Related Publications
These documents provide complete information about the bridge:
Click this link to browse the available documentation:
http://www.cisco.com/cisco/web/psa/default.html
To browse to the 1400 series bridge documentation, choose Wireless >Outdoor Wireless > Cisco Aironet 1400 Series.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS Version 2.0.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xvii
Related Publications
Preface
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
xviii
OL-4059-01
CHA P TER
1
Overview
Cisco Aironet 1400 Series Bridges (hereafter called bridges) provide building-to-building wireless
connectivity. Operating in the 5.8-GHz, UNII-3 band and conforming to the 802.11a standard, the 1400
series bridge delivers a 54-Mbps data rate. The bridge is a self-contained unit designed for outdoor
installations. You can connect external antennas to the bridge to attain various antenna gains and
coverage patterns. The bridge supports both point-to-point and point-to-multipoint configurations.
You can configure and monitor the bridge using the command-line interface (CLI), the browser-based
management system, or Simple Network Management Protocol (SNMP).
This chapter provides information on the following topics:
• Features, page 1-2
• Management Options, page 1-2
• Network Configuration Examples, page 1-3
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
1-1
Features
Features
Chapter 1 Overview
Bridges running Cisco IOS offer these software features:
• VLANs—Allow VLAN trunking on both wireless and Ethernet interfaces.
• QoS—Use this feature to support quality of service for prioritizing traffic on the wireless interface.
• RADIUS Accounting—Enable accounting on the bridge to send accounting data about wireless
client devices to a RADIUS server on your network.
• TACACS+ adminstrator authentication—Enable TACACS+ for server-based, detailed accounting
information and flexible administrative control over authentication and authorization processes. It
provides secure, centralized validation of administrators attempting to gain access to your bridge.
• Enhanced security—Enable three advanced security features to protect against sophisticated attacks
on your wireless network's WEP keys: Message Integrity Check (MIC) and WEP key hashing.
• Enhanced authentication services—Set up non-root bridges to authenticate to your network like
other wireless client devices. After you provide a network username and password for the non-root
bridge, it authenticates to your network using LEAP, Cisco's wireless authentication method, and
receives and uses dynamic WEP keys.
Management Options
You can use the bridge management system through the following interfaces:
• The IOS command-line interface (CLI), which you use through a Telnet session. Most of the
examples in this manual are taken from the CLI. Chapter 4, “Using the Command-Line Interface,”
provides a detailed description of the CLI.
• A web-browser interface, which you use through a web browser. Chapter 3, “Using the
Web-Browser Interface,” provides a detailed description of the web-browser interface.
• Simple Network Management Protocol (SNMP). Chapter 16, “Configuring SNMP,” explains how to
configure your bridge for SNMP management.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
1-2
OL-4059-01
Chapter 1 Overview
SwitchSwitch
Non-Root
Bridge
Root Bridge
Network Configuration Examples
This section describes the bridge’s role in common wireless bridging configurations: point-to-point,
point-to-multipoint, and redundant bridging. One bridge in any pair or group of bridges must be a root
bridge, and the bridge or bridges associated to the root bridge must be set to non-root.
Point-to-Point Bridging
In a point-to-point configuration, a non-root bridge associates to a root bridge. In installation mode, the
bridge listens for another 1400 series bridge. If it does not recognize another bridge, the bridge becomes
a root bridge. If it recognizes another bridge, it becomes a non-root bridge associated to the bridge it
recognizes. See Chapter 2, “Configuring the Bridge for the First Time,” for instructions on initial bridge
setup.
Figure 1-1 shows bridges in a point-to-point configuration.
Figure 1-1Point-to-Point Bridge Configuration
Network Configuration Examples
NoteIf your bridges connect one or more large, flat networks (a network containing more than 256 users on
the same subnet) we recommend that you use a router to connect the bridge to the large, flat network.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
1-3
Network Configuration Examples
88905
Switch
Switch
Switch
Root Bridge
Non-Root
Bridge
Non-Root
Bridge
Switch
Non-Root
Bridge
Point-to-Multipoint Bridging
In a point-to-multipoint configuration, two or more non-root bridges associate to a root bridge. Up to 17
non-root bridges can associate to a root bridge, but the non-root bridges must share the available
bandwidth.
See Chapter 2, “Configuring the Bridge for the First Time,” for instructions on initial bridge setup.
Figure 1-2 shows bridges in a point-to-multipoint configuration.
NoteIf your bridges connect one or more large, flat networks (a network containing more than 256 users on
the same subnet) we recommend that you use a router to connect the bridge to the large, flat network.
Redundant Bridging
You can set up two pairs of bridges to add redundancy or load balancing to your bridge link. The bridges
must use non-adjacent, non-overlapping radio channels to prevent interference, and they must use
Spanning Tree Protocol (STP) to prevent bridge loops. See Chapter 8, “Configuring Spanning Tree
Protocol,” for instructions on configuring STP.
NoteSTP is disabled by default.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
1-4
OL-4059-01
Chapter 1 Overview
88900
Switch on
LAN 1
Switch on
LAN 2
Root BridgeNon-Root
Bridge
Non-Root
Bridge
Root Bridge
Network Configuration Examples
Figure 1-3 shows two pairs of redundant bridges.
Figure 1-3Redundant Bridge Configuration
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
1-5
Network Configuration Examples
Chapter 1 Overview
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
1-6
OL-4059-01
CHA P TER
2
Configuring the Bridge for the First Time
This chapter describes how to configure basic settings on your bridge for the first time. You can
configure all the settings described in this chapter using the CLI, but it might be simplest to browse to
the bridge’s web-browser interface to complete the initial configuration and then use the CLI to enter
additional settings for a more detailed configuration.
This chapter contains these sections:
• Before You Start, page 2-2
• Obtaining and Assigning an IP Address, page 2-3
• Assigning Basic Settings, page 2-4
• Protecting Your Wireless LAN, page 2-8
• Using the IP Setup Utility, page 2-8
• Assigning an IP Address Using the CLI, page 2-11
• Using a Telnet Session to Access the CLI, page 2-12
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-1
Before You Start
Before You Start
Before you install the bridge, make sure you are using a computer connected to the same network as the
bridge, and obtain the following information from your network administrator:
• A system name for the bridge
• The case-sensitive wireless service set identifier (SSID) that your bridges use
• If not connected to a DHCP server, a unique IP address for your bridge (such as 172.17.255.115)
• If the bridge is not on the same subnet as your PC, a default gateway address and subnet mask
• A Simple Network Management Protocol (SNMP) community name and the SNMP file attribute (if
SNMP is in use)
• If you use IPSU to find or assign the bridge IP address, the MAC address from the product label on
the bridge (such as 00164625854c)
Resetting the Bridge to Default Settings
Chapter 2 Configuring the Bridge for the First Time
If you need to start over during the initial setup process, follow these steps to reset the bridge to factory
default settings using the MODE button on the long-reach power injector:
Step 1Disconnect power from the power injector.
Step 2Press and hold the MODE button while you reconnect the power cable.
Step 3Hold the MODE button until the Status LED on the power injector turns amber (approximately 3 to 4
seconds), and release the button. Wait until the status LED turns green to indicate that the bridge has
booted up. All bridge settings return to factory defaults.
Follow these steps to return to default settings using the web-browser interface:
Step 1Open your Internet browser. You must use Microsoft Internet Explorer (version 5.x or later) or Netscape
Navigator (version 4.x).
Step 2Enter the bridge’s IP address in the browser address line and press Enter. An Enter Network Password
window appears.
Step 3Enter your username in the User Name field. The default username is Cisco.
Step 4Enter the bridge password in the Password field and press Enter. The default password is Cisco. The
Summary Status page appears.
Step 5Click System Software and the System Software screen appears.
Step 6Click System Configuration and the System Configuration screen appears.
Step 7Click the Reset toDefaults button.
NoteIf the bridge is configured with a static IP address, the IP address does not change.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-2
OL-4059-01
Chapter 2 Configuring the Bridge for the First Time
Obtaining and Assigning an IP Address
To browse to the bridge’s Express Setup page, you must either obtain or assign the bridge’s IP address
using one of the following methods:
• Use default address 10.0.0.1 when you connect to the bridge locally. For detailed instructions, see
the “Connecting to the Bridge Locally” section on page 2-3.
• Use a DHCP server (if available) to automatically assign an IP address. You can find out the
DHCP-assigned IP address using one of the following methods:
–
Provide your organization’s network administrator with your bridge’s Media Access Control
(MAC) address. Your network administrator will query the DHCP server using the MAC
address to identify the IP address. The bridge’s MAC address is on the label attached to the
bottom of the bridge.
–
Use the Cisco IP Setup Utility (IPSU) to identify the assigned address. You can also use IPSU
to assign an IP address to the bridge if it did not receive an IP address from the DHCP server.
IPSU runs on most Microsoft Windows operating systems: Windows 9x, 2000, Me, NT, and XP.
You can download IPSU from the Software Center on Cisco.com. Click this link to browse to
the Software Center:
If the unit is a non-root bridge, browse to the Associations page on the root bridge to which the
non-root is associated. The non-root bridge’s MAC address and IP address appear on the root
bridge’s Associations page.
Connecting to the Bridge Locally
If you need to configure the bridge locally (without connecting the bridge to a wired LAN), you can
connect a PC to the Ethernet port on the long-reach power injector using a Category 5 Ethernet cable.
You can use a local connection to the power injector’s Ethernet port much as you would use a serial port
connection.
NoteYou do not need a special crossover cable to connect your PC to the power injector; you can use
either a straight-through cable or a crossover cable.
If the bridge is configured with default values and not connected to a DHCP server or cannot obtain an
IP address, it defaults to IP address 10.0.0.1. When a non-root bridge associates to a root bridge, it
receives an IP address from the root bridge. Browse to the Associations page on the root bridge to find
the non-root bridge’s IP address, or use IPSU to find the IP address.
Follow these steps to connect to the bridge locally:
Step 1Make sure that the PC you intend to use is configured to obtain an IP address automatically, or manually
assign it an IP address from 10.0.0.2 to 10.0.0.10.
Step 2With the power cable disconnected from the power injector, connect your PC to the power injector using
a Category 5 Ethernet cable. You can use either a crossover cable or a straight-through cable.
Step 3Connect the power injector to the bridge using dual coaxial cables.
Step 4Connect the power injector power cable and power up the bridge.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-3
Assigning Basic Settings
Step 5Follow the steps in the “Assigning Basic Settings” section on page 2-4. If you make a mistake and need
to start over, follow the steps in the “Resetting the Bridge to Default Settings” section on page 2-2.
Step 6After configuring the bridge, remove the Ethernet cable from your PC and connect the power injector to
your wired LAN.
NoteWhen you connect your PC to the bridge or reconnect your PC to the wired LAN, you might need to
release and renew the IP address on the PC. On most PCs, you can perform a release and renew by
rebooting your PC or by entering ipconfig /release and ipconfig /renew commands in a command
prompt window. Consult your PC operating instructions for detailed instructions.
Assigning Basic Settings
After you determine or assign the bridge’s IP address, you can browse to the bridge’s Express Setup page
and perform an initial configuration:
Chapter 2 Configuring the Bridge for the First Time
Step 1Open your Internet browser. The bridge web-browser interface is fully compatible with these browsers:
Microsoft Internet Explorer versions 5.0, 5.01, 5.5 and 6.0; and Netscape Navigator versions 4.79 and
7.0.
Step 2Enter the bridge’s IP address in the browser address line and press Enter. An Enter Network Password
screen appears.
Step 3Press Ta b to bypass the Username field and advance to the Password field.
Step 4Enter the case-sensitive password Cisco and press Enter. The Summary Status page appears. Figure 2-1
shows the Summary Status page.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-4
OL-4059-01
Chapter 2 Configuring the Bridge for the First Time
Figure 2-1Summary Status Page
Assigning Basic Settings
Step 5
Click Express Setup. The Express Setup screen appears. Figure 2-2 shows the Express Setup page.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-5
Assigning Basic Settings
Chapter 2 Configuring the Bridge for the First Time
Figure 2-2Express Setup Page
2-6
Step 6
Enter the configuration settings you obtained from your system administrator. The configurable settings
include:
• System Name— The system name, while not an essential setting, helps identify the bridge on your
network. The system name appears in the titles of the management system pages.
• Configuration Server Protocol—Click on the button that matches the network’s method of IP
address assignment.
–
DHCP—IP addresses are automatically assigned by your network’s DHCP server.
–
Static IP—The bridge uses a static IP address that you enter in the IP address field.
• IP Address—Use this setting to assign or change the bridge’s IP address. If DHCP is enabled for
your network, leave this field blank.
NoteIf the bridge’s IP address changes while you are configuring the bridge using the web-browser
interface or a Telnet session over the wired LAN, you lose your connection to the bridge. If you
lose your connection, reconnect to the bridge using its new IP address. Follow the steps in the
“Resetting the Bridge to Default Settings” section on page 2-2 if you need to start over.
• IP Subnet Mask—Enter the IP subnet mask provided by your network administrator so the IP
address can be recognized on the LAN. If DHCP is enabled, leave this field blank.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
Chapter 2 Configuring the Bridge for the First Time
• Default Gateway—Enter the default gateway IP address provided by your network administrator.
If DHCP is enabled, leave this field blank.
• Radio Service Set ID (SSID)—Enter the case-sensitive SSID (32 alphanumeric characters
maximum) provided by your network administrator. The SSID is a unique identifier that bridges use
to associate to each other.
• Broadcast SSID in Beacon—Use this setting to allow bridges that do not specify an SSID to
associate with the bridge.
–
Ye s—This is the default setting; it allows bridges that do not specify an SSID to associate with
the bridge.
–
No—Bridges must specify an SSID to associate with the bridge. With No selected, the SSID
used by other bridges must match exactly the bridge’s SSID.
• Role in Radio Network—Click on the button that describes the role of the bridge on your network.
Select Root if the bridge is a root bridge. Select Non-Root if it is a non-root bridge. Select Install Mode to put the bridge into installation mode. One bridge in any pair or group of bridges must be
set to root, and the bridge or bridges associated to the root bridge must be set to non-root.
• Optimize Radio Network for—Use this setting to select either preconfigured settings for the bridge
radio or customized settings for the bridge radio. See the “Configuring Radio Data Rates” section
on page 6-3 for more information on data rates and throughput.
–
Throughput—Maximizes the data volume handled by the bridge but might reduce its range.
When you select Throughput, the bridge sets all data rates to basic.
Assigning Basic Settings
–
Range—Maximizes the bridge’s range but might reduce throughput. When you select Range,
the bridge sets the 6-Mbps rate to basic and the other rates to enabled.
–
Default—The bridge retains default radio settings that are designed to provide good range and
throughput for most bridges.
–
Custom—The bridge uses settings you enter on the Network Interfaces: Radio-802.11b
Settings page. Clicking Custom takes you to the Network Interfaces: Radio-802.11b Settings
page.
• Aironet Extensions—This setting is always enabled on 1400 series bridges.
• SNMP Community—If your network is using SNMP, enter the SNMP Community name provided
by your network administrator and select the attributes of the SNMP data (also provided by your
network administrator).
Step 7Click Apply to save your settings. If you changed the IP address, you lose your connection to the bridge.
Browse to the new IP address to reconnect to the bridge.
Your bridge is now running but probably requires additional configuring to conform to your network’s
operational and security requirements. Consult the chapters in this manual for the information you need
to complete the configuration.
NoteYou can restore the bridge to its factory defaults by unplugging the power cable from the power
injector and plugging it back in while holding down the power injector Mode button for a few
seconds, or until the power injector Status LED turns amber.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-7
Protecting Your Wireless LAN
Default Settings on the Express Setup Page
Table 2-1 lists the default settings for the settings on the Express Setup page.
Table 2-1Default Settings on the Express Setup Page
SettingDefault
System Namebridge
Configuration Server ProtocolDHCP
IP AddressAssigned by DHCP by default; if
DHCP is disabled, the default
setting is 10.0.0.1
IP Subnet MaskAssigned by DHCP by default; if
DHCP is disabled, the default
setting is 255.255.255.224
Default GatewayAssigned by DHCP by default; if
DHCP is disabled, the default
setting is 0.0.0.0
Radio Service Set ID (SSID)autoinstall
Broadcast SSID in BeaconYes
Role in Radio NetworkBridge (root)
Optimize Radio Network forDefault
Aironet ExtensionsEnable
SNMP CommunitydefaultCommunity
Chapter 2 Configuring the Bridge for the First Time
Protecting Your Wireless LAN
After you assign basic settings to your bridge, you must configure security settings to prevent
unauthorized access to your network. Because it is a radio device, the bridge can communicate beyond
the physical boundaries of your building. Configure some combination of these security features to
protect your network from intruders:
• A unique SSID that are not broadcast in the bridge beacon (see Chapter 7, “Configuring SSIDs”
• WEP and WEP features (see Chapter 9, “Configuring WEP and WEP Features”)
• Dynamic WEP and bridge authentication (see Chapter 10, “Configuring Authentication Types”)
Using the IP Setup Utility
IPSU enables you to find the bridge’s IP address when it has been assigned by a DHCP server. You can
also use IPSU to set the bridge’s IP address and SSID if they have not been changed from the default
settings. This section explains how to download the utility from Cisco.com and install it, how to use it
to find the bridge’s IP address, and how to use it to set the IP address and the SSID.
NoteIPSU can be used only on the following operating systems: Windows 95, 98, NT, 2000, ME, or XP.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-8
OL-4059-01
Chapter 2 Configuring the Bridge for the First Time
Obtaining and Installing IPSU
IPSU is available on the Cisco web site. Follow these steps to obtain and install IPSU:
Step 1Use your Internet browser to access the Cisco Software Center at the following URL:
Step 2Click Cisco Aironet Wireless LAN Client Adapters.
Step 3Scroll down to the Windows Utility section.
Step 4Click Cisco Aironet Client Utility (ACU) for Windows.
Step 5Click the file IPSUvxxxxxx.exe. The vxxxxxx identifies the software package version number.
Step 6Read and accept the terms and conditions of the Software License Agreement.
Step 7Download and save the file to a temporary directory on your hard drive and then exit the Internet browser.
Step 8Double-click IPSUvxxxxxx.exe in the temporary directory to expand the file.
Step 9Double-click Setup.exe and follow the steps provided by the installation wizard to install IPSU.
The IPSU icon appears on your computer desktop.
Using the IP Setup Utility
Using IPSU to Find the Bridge’s IP Address
If your bridge receives an IP address from a DHCP server, you can use IPSU to find its IP address.
Because IPSU sends a reverse-ARP request based on the bridge MAC address, you must run IPSU from
a computer on the same subnet as the bridge. Follow these steps to find the bridge’s IP address:
Step 1Double-click the IPSU icon on your computer desktop to start the utility. The IPSU screen appears (see
Figure 2-3).
Figure 2-3IPSU Get IP Address Screen
Step 2
OL-4059-01
When the utility window opens, make sure the Get IP addr radio button in the Function box is selected.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-9
Using the IP Setup Utility
Step 3Enter the bridge’s MAC address in the Device MAC ID field. The bridge’s MAC address is printed on
the label on the bottom of the unit. It should contain six pairs of hexadecimal digits. Your bridge’s MAC
address might look like the following example:
000164xxxxxx
NoteThe MAC address field is not case-sensitive.
Step 4Click Get IP Address.
Step 5When the bridge’s IP address appears in the IP Address field, write it down.
If IPSU reports that the IP address is 10.0.0.1, the default IP address, then the bridge did not receive a
DHCP-assigned IP address. To change the bridge IP address from the default value using IPSU, refer to
the “Using IPSU to Set the Bridge’s IP Address and SSID” section on page 2-10.
Using IPSU to Set the Bridge’s IP Address and SSID
Chapter 2 Configuring the Bridge for the First Time
If you want to change the default IP address (10.0.0.1) of the bridge, you can use IPSU. You can also set
the bridge’s SSID at the same time.
NoteIPSU can change the bridge’s IP address and SSID only from their default settings. After the IP address
and SSID have been changed, IPSU cannot change them again.
NoteThe computer you use to assign an IP address to the bridge must have an IP address in the same subnet
as the bridge (10.0.0.x).
Follow these steps to assign an IP address and an SSID to the bridge:
Step 1Double-click the IPSU icon on your computer desktop to start the utility.
Step 2Click the Set Parameters radio button in the Function box (see Figure 2-4).
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-10
OL-4059-01
Chapter 2 Configuring the Bridge for the First Time
Figure 2-4IPSU Set Parameters Screen
Assigning an IP Address Using the CLI
Step 3
Enter the bridge’s MAC address in the Device MAC ID field. The bridge’s MAC address is printed on a
label on the bridge. It should contain six pairs of hexadecimal digits. Your bridge’s MAC address might
look like this example:
004096xxxxxx
NoteThe MAC address field is not case-sensitive.
Step 4Enter the IP address you want to assign to the bridge in the IP Address field.
Step 5Enter the SSID you want to assign to the bridge in the SSID field.
NoteYou cannot set the SSID without also setting the IP address. However, you can set the IP address
without setting the SSID.
Step 6Click Set Parameters to change the bridge’s IP address and SSID settings.
Step 7Click Exit to exit IPSU.
Assigning an IP Address Using the CLI
When you connect the bridge to the wired LAN, the bridge links to the network using a bridge virtual
interface (BVI) that it creates automatically. Instead of tracking separate IP addresses for the bridge’s
Ethernet and radio ports, the network uses the BVI.
NoteThe bridge supports only one BVI. Configuring more than one BVI might cause errors in the bridge’s
ARP table.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-11
Using a Telnet Session to Access the CLI
When you assign an IP address to the bridge using the CLI, you must assign the address to the BVI.
Beginning in privileged EXEC mode, follow these steps to assign an IP address to the bridge’s BVI:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
interface bvi1Enter interface configuration mode for the BVI.
ip address address
mask
Assign an IP address and address mask to the BVI.
NoteIf you are connected to the bridge using a Telnet
session, you lose your connection to the bridge when
you assign a new IP address to the BVI. If you need to
continue configuring the bridge using Telnet, use the
new IP address to open another Telnet session to the
bridge.
Using a Telnet Session to Access the CLI
Chapter 2 Configuring the Bridge for the First Time
Follow these steps to browse to access the CLI using a Telnet session. These steps are for a PC running
Microsoft Windows with a Telnet terminal application. Check your PC operating instructions for
detailed instructions for your operating system.
If Telnet is not listed in your Accessories menu, select Start > Run, type Tel ne t in the entry field, and
press Enter.
Step 2When the Telnet window appears, click Connect and select Remote System.
NoteIn Windows 2000, the Telnet window does not contain drop-down menus. To start the Telnet
session in Windows 2000, type open followed by the bridge’s IP address.
Step 3In the Host Name field, type the bridge’s IP address and click Connect.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
2-12
OL-4059-01
CHA P TER
Using the Web-Browser Interface
This chapter describes the web-browser interface that you can use to configure the bridge. It contains
these sections:
• Using the Web-Browser Interface for the First Time, page 3-2
• Using the Management Pages in the Web-Browser Interface, page 3-2
• Using Online Help, page 3-5
The web-browser interface contains management pages that you use to change bridge settings, upgrade
firmware, and monitor and configure other wireless devices on the network.
NoteThe bridge web-browser interface is fully compatible with these browsers: Microsoft Internet
Explorer versions 5.0, 5.01, 5.5 and 6.0; and Netscape Navigator versions 4.79 and 7.0.
3
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-1
Chapter 3 Using the Web-Browser Interface
Using the Web-Browser Interface for the First Time
Using the Web-Browser Interface for the First Time
Use the bridge’s IP address to browse to the management system. See the “Obtaining and Assigning an
IP Address” section on page 2-3 for instructions on assigning an IP address to the bridge.
Follow these steps to begin using the web-browser interface:
Step 1Start the browser.
Step 2Enter the bridge’s IP address in the browser Location field (Netscape Communicator) or Address field
(Internet Explorer) and press Enter.
Step 3Enter the administrator username and password and press Enter. The default username is Cisco and the
default password is Cisco. The Summary Status page appears.
Using the Management Pages in the Web-Browser Interface
The system management pages use consistent techniques to present and save configuration information.
A navigation bar is on the left side of the page, and configuration action buttons appear at the bottom.
You use the navigation bar to browse to other management pages, and you use the configuration action
buttons to save or cancel changes to the configuration.
NoteIt’s important to remember that clicking your browser’s Back button returns you to the previous page
without saving any changes you have made. Clicking Cancel cancels any changes you made on the page
and keeps you on that page. Changes are only applied when you click Apply.
Figure 3-1 shows the web-browser interface home page.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-2
OL-4059-01
Chapter 3 Using the Web-Browser Interface
Figure 3-1Web-Browser Interface Home Page
Using the Management Pages in the Web-Browser Interface
Using Action Buttons
Table 3-1 lists the page links and buttons that appear on most management pages.
Table 3-1Common Buttons on Management Pages
Button/LinkDescription
Navigation Links
HomeDisplays bridge status page with information on the number of radio devices
Express SetupDisplays the Express Setup page that includes basic settings such as system
Network MapDisplays a list of infrastructure devices on your wireless LAN.
AssociationDisplays a list of all devices on your wireless LAN, listing their system names,
Network InterfacesDisplays status and statistics for the Ethernet and radio interfaces and provides
SecurityDisplays a summary of security settings and provides links to security
ServicesDisplays status for several bridge features and links to configuration pages for
associated to the bridge, the status of the Ethernet and radio interfaces, and a
list of recent bridge activity.
name, IP address, and SSID.
network roles, and parent-client relationships.
links to configuration pages for each interface.
configuration pages.
Telnet/SSH, CDP, domain name server, filters, proxy Mobile IP, QoS, SNMP,
SNTP, and VLANs.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-3
Using the Management Pages in the Web-Browser Interface
Table 3-1Common Buttons on Management Pages (continued)
Button/LinkDescription
System SoftwareDisplays the version number of the firmware that the bridge is running and
provides links to configuration pages for upgrading and managing firmware.
Event LogDisplays the bridge event log and provides links to configuration pages where
you can select events to be included in traps, set event severity levels, and set
notification methods.
Configuration Action Buttons
ApplySaves changes made on the page and remains on the page.
RefreshUpdates status information or statistics displayed on a page.
CancelDiscards changes to the page and remains on the page.
BackDiscards any changes made to the page and returns to the previous page.
Character Restrictions in Entry Fields
Chapter 3 Using the Web-Browser Interface
Because the 1400 series bridge uses Cisco IOS software, there are certain characters that you cannot use
in the entry fields on the web-browser interface. Table 3-2 lists the illegal characters and the fields in
which you cannot use them.
Table 3-2Illegal Characters for Web-Browser Interface Entry Fields
Entry Field TypeIllegal Characters
Password entry fields?
“
$
[
+
All other entry fields?
“
$
[
+
You also cannot use these
three characters as the
first character in an entry
field:
!
#
;
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-4
OL-4059-01
Chapter 3 Using the Web-Browser Interface
Using Online Help
Click the help icon at the top of any page in the web-browser interface to display online help. Figure 3-2
shows the print and help icons.
Figure 3-2Print and Help Icons
When a help page appears in a new browser window, use the Select a topic drop-down menu to display
the help index or instructions for common configuration tasks, such as configuring VLANs.
Using Online Help
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-5
Using Online Help
Chapter 3 Using the Web-Browser Interface
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
3-6
OL-4059-01
CHA P TER
4
Using the Command-Line Interface
This chapter describes the IOS command-line interface (CLI) that you can use to configure your bridge.
It contains these sections:
• IOS Command Modes, page 4-2
• Getting Help, page 4-3
• Abbreviating Commands, page 4-3
• Using no and default Forms of Commands, page 4-3
• Understanding CLI Messages, page 4-4
• Using Command History, page 4-4
• Using Editing Features, page 4-5
• Searching and Filtering Output of show and more Commands, page 4-8
• Accessing the CLI, page 4-8
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-1
IOS Command Modes
IOS Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you
depend on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a
list of commands available for each command mode.
When you start a session on the bridge, you begin in user mode, often called user EXEC mode. Only a
limited subset of the commands are available in user EXEC mode. For example, most of the user EXEC
commands are one-time commands, such as show commands, which show the current configuration
status, and clear commands, which clear counters or interfaces. The user EXEC commands are not saved
when the bridge reboots.
To have access to all commands, you must enter privileged EXEC mode. Normally, you must enter a
password to enter privileged EXEC mode. From this mode, you must enter privileged EXEC mode
before you can enter the global configuration mode.
Using the configuration modes (global, interface, and line), you can make changes to the running
configuration. If you save the configuration, these commands are stored and used when the bridge
reboots. To access the various configuration modes, you must start at global configuration mode. From
global configuration mode, you can enter interface configuration mode and line configuration mode.
Tabl e 4-1 describes the main command modes, how to access each one, the prompt you see in that mode, and
how to exit the mode. The examples in the table use the host name BR.
Chapter 4 Using the Command-Line Interface
Table 4-1Command Mode Summary
ModeAccess MethodPromptExit MethodAbout This Mode
User EXECBegin a session with
your bridge.
BR>
Enter logout or quit.Use this mode to:
• Change terminal settings
• Perform basic tests
• Display system
information
Privileged EXECWhile in user EXEC
mode, enter the
enable command.
Global configurationWhile in privileged
EXEC mode, enter
the configure
BR#
BR(config)#
Enter disable to exit.Use this mode to verify
commands. Use a password to
protect access to this mode.
To exit to privileged
EXEC mode, enter exit or
end, or press Ctrl-Z.
Use this mode to configure
parameters that apply to the
entire bridge.
command.
Interface
configuration
While in global
configuration mode,
enter the interface
command (with a
specific interface).
BR(config-if)#
To exit to global
configuration mode, enter
exit. To return to
privileged EXEC mode,
press Ctrl-Z or enter end.
Use this mode to configure
parameters for the Ethernet
and radio interfaces. The
2.4-GHz radio is radio 0, and
the 5-GHz radio is radio 1.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-2
OL-4059-01
Chapter 4 Using the Command-Line Interface
Getting Help
You can enter a question mark (?) at the system prompt to display a list of commands available for each
command mode. You can also obtain a list of associated keywords and arguments for any command, as
shown in Table 4-2 .
Table 4-2Help Summary
CommandPurpose
helpObtains a brief description of the help system in any command mode.
abbreviated-command-entry?Obtains a list of commands that begin with a particular character string.
For example:
BR# di?
dir disable disconnect
abbreviated-command-entry<Ta b>Completes a partial command name.
For example:
BR# sh conf<tab>
BR# show configuration
?Lists all commands available for a particular command mode.
For example:
BR> ?
command ?Lists the associated keywords for a command.
Getting Help
For example:
BR> show ?
command keyword?Lists the associated arguments for a keyword.
For example:
BR(config)# cdp holdtime ?
<10-255> Length of time (in sec) that receiver must keep this packet
Abbreviating Commands
You have to enter only enough characters for the bridge to recognize the command as unique. This
example shows how to enter the show configuration privileged EXEC command:
BR# show conf
Using no and default Forms of Commands
Most configuration commands also have a no form. In general, use the no form to disable a feature or
function or reverse the action of a command. For example, the no shutdown interface configuration
command reverses the shutdown of an interface. Use the command without the keyword no to re-enable
a disabled feature or to enable a feature that is disabled by default.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-3
Understanding CLI Messages
Configuration commands can also have a default form. The default form of a command returns the
command setting to its default. Most commands are disabled by default, so the default form is the same
as the no form. However, some commands are enabled by default and have variables set to certain default
values. In these cases, the default command enables the command and sets variables to their default
values.
Understanding CLI Messages
Table 4-3 lists some error messages that you might encounter while using the CLI to configure your
bridge.
Table 4-3Common CLI Error Messages
Error MessageMeaningHow to Get Help
% Ambiguous command:
"show con"
% Incomplete command.
% Invalid input detected
at ‘^’ marker.
You did not enter enough characters
for your bridge to recognize the
command.
You did not enter all the keywords or
values required by this command.
You entered the command
incorrectly. The caret (^) marks the
point of the error.
Re-enter the command followed by a question mark (?)
with a space between the command and the question
mark.
The possible keywords that you can enter with the
command are displayed.
Re-enter the command followed by a question mark (?)
with a space between the command and the question
mark.
The possible keywords that you can enter with the
command are displayed.
Enter a question mark (?) to display all the commands
that are available in this command mode.
The possible keywords that you can enter with the
command are displayed.
Chapter 4 Using the Command-Line Interface
Using Command History
The IOS provides a history or record of commands that you have entered. This feature is particularly
useful for recalling long or complex commands or entries, including access lists. You can customize the
command history feature to suit your needs as described in these sections:
• Changing the Command History Buffer Size, page 4-4
• Recalling Commands, page 4-5
• Disabling the Command History Feature, page 4-5
Changing the Command History Buffer Size
By default, the bridge records ten command lines in its history buffer. Beginning in privileged EXEC
mode, enter this command to change the number of command lines that the bridge records during the
current terminal session:
BR# terminal history [sizenumber-of-lines]
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-4
OL-4059-01
Chapter 4 Using the Command-Line Interface
Using Editing Features
The range is from 0 to 256.
Beginning in line configuration mode, enter this command to configure the number of command lines
the bridge records for all sessions on a particular line:
BR(config-line)# history[sizenumber-of-lines]
The range is from 0 to 256.
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in Tab le 4-4:
Table 4-4Recalling Commands
1
Action
Press Ctrl-P or the up arrow key.Recall commands in the history buffer, beginning with the most recent command.
Press Ctrl-N or the down arrow key.Return to more recent commands in the history buffer after recalling commands
show historyWhile in privileged EXEC mode, list the last several commands that you just
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
Result
Repeat the key sequence to recall successively older commands.
with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively
more recent commands.
entered. The number of commands that are displayed is determined by the setting
of the terminal history global configuration command and history line
configuration command.
Disabling the Command History Feature
The command history feature is automatically enabled.
To disable the feature during the current terminal session, enter the terminal no history privileged
EXEC command.
To disable command history for the line, enter the no history line configuration command.
Using Editing Features
This section describes the editing features that can help you manipulate the command line. It contains
these sections:
• Enabling and Disabling Editing Features, page 4-6
• Editing Commands Through Keystrokes, page 4-6
• Editing Command Lines that Wrap, page 4-7
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-5
Using Editing Features
Enabling and Disabling Editing Features
Although enhanced editing mode is automatically enabled, you can disable it.
To re-enable the enhanced editing mode for the current terminal session, enter this command in
privileged EXEC mode:
BR# terminal editing
To reconfigure a specific line to have enhanced editing mode, enter this command in line configuration
mode:
BR(config-line)# editing
To globally disable enhanced editing mode, enter this command in line configuration mode:
BR(config-line)# no editing
Editing Commands Through Keystrokes
Table 4-5 shows the keystrokes that you need to edit command lines.
Chapter 4 Using the Command-Line Interface
Table 4-5Editing Commands Through Keystrokes
CapabilityKeystroke
Move around the command line to
make changes or corrections.
Ctrl-B or the left arrow
key
1
Ctrl-F or the right arrow
key
Ctrl-AMove the cursor to the beginning of the command line.
Ctrl-EMove the cursor to the end of the command line.
Esc BMove the cursor back one word.
Esc FMove the cursor forward one word.
Ctrl-TTranspose the character to the left of the cursor with the
Recall commands from the buffer and
paste them in the command line. The
bridge provides a buffer with the last
Ctrl-YRecall the most recent entry in the buffer.
Esc YRecall the next buffer entry.
ten items that you deleted.
Delete entries if you make a mistake
or change your mind.
Delete or BackspaceErase the character to the left of the cursor.
Ctrl-DDelete the character at the cursor.
Ctrl-KDelete all characters from the cursor to the end of the
Ctrl-U or Ctrl-XDelete all characters from the cursor to the beginning of
Ctrl-WDelete the word to the left of the cursor.
Esc DDelete from the cursor to the end of the word.
Purpose
Move the cursor back one character.
Move the cursor forward one character.
character located at the cursor.
The buffer contains only the last 10 items that you have
deleted or cut. If you press Esc Y more than ten times, you
cycle to the first buffer entry.
command line.
the command line.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-6
OL-4059-01
Chapter 4 Using the Command-Line Interface
Table 4-5Editing Commands Through Keystrokes (continued)
Using Editing Features
CapabilityKeystroke
Capitalize or lowercase words or
capitalize a set of letters.
Esc CCapitalize at the cursor.
Esc LChange the word at the cursor to lowercase.
1
Esc UCapitalize letters from the cursor to the end of the word.
Designate a particular keystroke as
Ctrl-V or Esc Q
an executable command, perhaps as a
shortcut.
Scroll down a line or screen on
displays that are longer than the
terminal screen can display.
NoteThe More prompt appears for
ReturnScroll down one line.
SpaceScroll down one screen.
output that has more lines
than can be displayed on the
terminal screen, including
show command output. You
can use the Return and
Space bar keystrokes
whenever you see the
More
prompt.
Redisplay the current command line
Ctrl-L or Ctrl-RRedisplay the current command line.
if the bridge suddenly sends a
message to your screen.
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
Purpose
Editing Command Lines that Wrap
You can use a wraparound feature for commands that extend beyond a single line on the screen. When
the cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the
first ten characters of the line, but you can scroll back and check the syntax at the beginning of the
command.
To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You
can also press Ctrl-A to immediately move to the beginning of the line.
NoteThe arrow keys function only on ANSI-compatible terminals such as VT100s.
In this example, the access-list global configuration command entry extends beyond one line. When the
cursor first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar
sign ($) shows that the line has been scrolled to the left. Each time the cursor reaches the end of the line,
the line is again shifted ten spaces to the left.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-7
Chapter 4 Using the Command-Line Interface
Searching and Filtering Output of show and more Commands
After you complete the entry, press Ctrl-A to check the complete syntax before pressing the Return key
to execute the command. The dollar sign ($) appears at the end of the line to show that the line has been
scrolled to the right:
The software assumes you have a terminal screen that is 80 columns wide. If you have a width other than
that, use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command
entries. For information about recalling previous command entries, see the “Editing Commands Through
Keystrokes” section on page 4-6.
Searching and Filtering Output of show and more Commands
You can search and filter the output for show and more commands. This is useful when you need to sort
through large amounts of output or if you want to exclude output that you do not need to see.
To use this functionality, enter a show or more command followed by the pipe character (|), one of the
keywords begin, include, or exclude, and an expression that you want to search for or filter out:
command| {begin | include | exclude} regular-expression
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output
are not displayed, but the lines that contain Output are displayed.
This example shows how to include in the output display only lines where the expression protocol
appears:
BR# show interfaces | include protocol
Vlan1 is up, line protocol is up
Vlan10 is up, line protocol is down
GigabitEthernet0/1 is up, line protocol is down
GigabitEthernet0/2 is up, line protocol is up
Accessing the CLI
You can open the bridge’s CLI using Telnet or Secure Shell (SSH).
Opening the CLI with Telnet
Follow these steps to open the CLI with Telnet. These steps are for a PC running Microsoft Windows
with a Telnet terminal application. Check your PC operating instructions for detailed instructions for
your operating system.
If Telnet is not listed in your Accessories menu, select Start > Run, type Tel ne t in the entry field, and
press Enter.
Step 2When the Telnet window appears, click Connect and select Remote System.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-8
OL-4059-01
Chapter 4 Using the Command-Line Interface
NoteIn Windows 2000, the Telnet window does not contain drop-down menus. To start the Telnet
session in Windows 2000, type open followed by the bridge’s IP address.
Step 3In the Host Name field, type the bridge’s IP address and click Connect.
Step 4At the username and password prompts, enter your administrator username and password. The default
username is Cisco, and the default password is Cisco. The default enable password is also Cisco.
Usernames and passwords are case-sensitive.
Opening the CLI with Secure Shell
Secure Shell Protocol is a protocol that provides a secure, remote connection to networking devices set
up to use it. Secure Shell (SSH) is a software package that provides secure login sessions by encrypting
the entire session. SSH features strong cryptographic authentication, strong encryption, and integrity
protection. For detailed information on SSH, visit the homepage of SSH Communications Security, Ltd.
at this URL: http://www.ssh.com/
SSH provides more security for remote connections than Telnet by providing strong encryption when a
device is authenticated. See the “Configuring the Bridge for Secure Shell” section on page 5-16 for
detailed instructions on setting up the bridge for SSH access.
Accessing the CLI
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-9
Accessing the CLI
Chapter 4 Using the Command-Line Interface
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
4-10
OL-4059-01
CHA P TER
Administering the Bridge
This chapter describes how to administer your bridge. This chapter contains these sections:
• Preventing Unauthorized Access to Your Bridge, page 5-2
• Protecting Access to Privileged EXEC Commands, page 5-2
• Controlling Bridge Access with RADIUS, page 5-7
• Controlling Bridge Access with TACACS+, page 5-12
• Configuring the Bridge for Local Authentication and Authorization, page 5-15
• Configuring the Bridge for Secure Shell, page 5-16
• Managing the System Time and Date, page 5-17
• Configuring a System Name and Prompt, page 5-31
• Creating a Banner, page 5-33
5
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-1
Chapter 5 Administering the Bridge
Preventing Unauthorized Access to Your Bridge
Preventing Unauthorized Access to Your Bridge
You can prevent unauthorized users from reconfiguring your bridge and viewing configuration
information. Typically, you want network administrators to have access to the bridge while you restrict
access to users who connect through a terminal or workstation from within the local network.
To prevent unauthorized access to your bridge, you should configure one of these security features:
• Username and password pairs, which are locally stored on the bridge. These pairs authenticate each
user before that user can access the bridge. You can also assign a specific privilege level (read only
or read/write) to each username and password pair. For more information, see the “Configuring
Username and Password Pairs” section on page 5-5. The default username is Cisco, and the default
password is Cisco. Usernames and passwords are case-sensitive.
• Username and password pairs stored centrally in a database on a security server. For more
information, see the “Controlling Bridge Access with RADIUS” section on page 5-7.
Protecting Access to Privileged EXEC Commands
A simple way of providing terminal access control in your network is to use passwords and assign
privilege levels. Password protection restricts access to a network or network device. Privilege levels
define what commands users can issue after they have logged into a network device.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Security Command Reference for Release 12.2.
This section describes how to control access to the configuration file and privileged EXEC commands.
It contains this configuration information:
• Default Password and Privilege Level Configuration, page 5-2
• Setting or Changing a Static Enable Password, page 5-3
• Protecting Enable and Enable Secret Passwords with Encryption, page 5-4
• Configuring Username and Password Pairs, page 5-5
• Configuring Multiple Privilege Levels, page 5-6
Default Password and Privilege Level Configuration
Table 5-1 shows the default password and privilege level configuration.
Table 5-1Default Password and Privilege Levels
FeatureDefault Setting
Username and passwordDefault username is Cisco and the default password is Cisco.
Enable password and privilege levelDefault password is Cisco. The default is level 15 (privileged EXEC
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-2
level). The password is encrypted in the configuration file.
OL-4059-01
Chapter 5 Administering the Bridge
Protecting Access to Privileged EXEC Commands
Table 5-1Default Password and Privilege Levels (continued)
FeatureDefault Setting
Enable secret password and privilege levelThe default enable password is Cisco. The default is level 15 (privileged
EXEC level). The password is encrypted before it is written to the
configuration file.
Line passwordDefault password is Cisco. The password is encrypted in the configuration
file.
Setting or Changing a Static Enable Password
The enable password controls access to the privileged EXEC mode.
NoteThe no enable password global configuration command removes the enable password, but you should
use extreme care when using this command. If you remove the enable password, you are locked out of
the EXEC mode.
Step 1
Step 2
Step 3
Step 4
Step 5
Beginning in privileged EXEC mode, follow these steps to set or change a static enable password:
CommandPurpose
configure terminalEnter global configuration mode.
enable password passwordDefine a new password or change an existing password for access to
privileged EXEC mode.
The default password is Cisco.
For password, specify a string from 1 to 25 alphanumeric characters. The
string cannot start with a number, is case sensitive, and allows spaces but
ignores leading spaces. It can contain the question mark (?) character if
you precede the question mark with the key combination Crtl-V when you
create the password; for example, to create the password abc?123, do this:
1. Enter abc.
2. Enter Crtl-V.
3. Enter ?123.
When the system prompts you to enter the enable password, you need not
precede the question mark with the Ctrl-V; you can simply enter abc?123
at the password prompt.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
The enable password is not encrypted and can be read in the bridge
configuration file.
This example shows how to change the enable password to l1u2c3k4y5. The password is not encrypted
and provides access to level 15 (traditional privileged EXEC mode access):
bridge(config)# enable password l1u2c3k4y5
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-3
Chapter 5 Administering the Bridge
Protecting Access to Privileged EXEC Commands
Protecting Enable and Enable Secret Passwords with Encryption
To provide an additional layer of security, particularly for passwords that cross the network or that are
stored on a Trivial File Transfer Protocol (TFTP) server, you can use either the enable password or
enable secret global configuration commands. Both commands accomplish the same thing; that is, you
can establish an encrypted password that users must enter to access privileged EXEC mode (the default)
or any privilege level you specify.
We recommend that you use the enable secret command because it uses an improved encryption
algorithm.
If you configure the enable secret command, it takes precedence over the enable password command;
the two commands cannot be in effect simultaneously.
Beginning in privileged EXEC mode, follow these steps to configure encryption for enable and enable
secret passwords:
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
enable password [level level] {password |
encryption-type encrypted-password}
Define a new password or change an existing password for
access to privileged EXEC mode.
Define a secret password, which is saved using a
nonreversible encryption method.
• (Optional) For level, the range is from 0 to 15. Level 1 is
normal user EXEC mode privileges. The default level is
15 (privileged EXEC mode privileges).
• For password, specify a string from 1 to 25
alphanumeric characters. The string cannot start with a
number, is case sensitive, and allows spaces but ignores
leading spaces. By default, no password is defined.
• (Optional) For encryption-type, only type 5, a Cisco
proprietary encryption algorithm, is available. If you
specify an encryption type, you must provide an
encrypted password—an encrypted password you copy
from another bridge configuration.
NoteIf you specify an encryption type and then enter a
clear text password, you can not re-enter privileged
EXEC mode. You cannot recover a lost encrypted
password by any method.
service password-encryption(Optional) Encrypt the password when the password is
defined or when the configuration is written.
Encryption prevents the password from being readable in the
configuration file.
endReturn to privileged EXEC mode.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-4
OL-4059-01
Chapter 5 Administering the Bridge
If both the enable and enable secret passwords are defined, users must enter the enable secret password.
Use the level keyword to define a password for a specific privilege level. After you specify the level and
set a password, give the password only to users who need to have access at this level. Use the privilege level global configuration command to specify commands accessible at various levels. For more
information, see the “Configuring Multiple Privilege Levels” section on page 5-6.
If you enable password encryption, it applies to all passwords including username passwords,
authentication key passwords, the privileged command password, and console and virtual terminal line
passwords.
To remove a password and level, use the no enable password [levellevel] or no enable secret [level
level] global configuration command. To disable password encryption, use the no service
password-encryption global configuration command.
This example shows how to configure the encrypted password $1$FaD0$Xyti5Rkls3LoyxzS8 for
privilege level 2:
You can configure username and password pairs, which are locally stored on the bridge. These pairs are
assigned to lines or interfaces and authenticate each user before that user can access the bridge. If you
have defined privilege levels, you can also assign a specific privilege level (with associated rights and
privileges) to each username and password pair.
Beginning in privileged EXEC mode, follow these steps to establish a username-based authentication
system that requests a login username and a password:
CommandPurpose
configure terminalEnter global configuration mode.
username name [privilege level]
{passwordencryption-typepassword}
Enter the username, privilege level, and password for each user.
• For name, specify the user ID as one word. Spaces and quotation
marks are not allowed.
• (Optional) For level, specify the privilege level the user has after
gaining access. The range is 0 to 15. Level 15 gives privileged EXEC
mode access. Level 1 gives user EXEC mode access.
• For encryption-type, enter 0 to specify that an unencrypted password
will follow. Enter 7 to specify that a hidden password will follow.
• For password, specify the password the user must enter to gain access
to the bridge. The password must be from 1 to 25 characters, can
contain embedded spaces, and must be the last option specified in the
username command.
login localEnable local password checking at login time. Authentication is based on
the username specified in Step 2.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-5
Protecting Access to Privileged EXEC Commands
To disable username authentication for a specific user, use the no usernamename global configuration
command.
To disable password checking and allow connections without a password, use the no login line
configuration command.
NoteYou must have at least one username configured and you must have login local set to open a
Telnet session to the bridge. If you enter no username for the only username, you can be locked
out of the bridge.
Configuring Multiple Privilege Levels
By default, the IOS software has two modes of password security: user EXEC and privileged EXEC. You
can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple
passwords, you can allow different sets of users to have access to specified commands.
For example, if you want many users to have access to the clear line command, you can assign it
level 2 security and distribute the level 2 password fairly widely. But if you want more restricted access
to the configure command, you can assign it level 3 security and distribute that password to a more
restricted group of users.
This section includes this configuration information:
• Setting the Privilege Level for a Command, page 5-6
Chapter 5 Administering the Bridge
• Logging Into and Exiting a Privilege Level, page 5-7
Setting the Privilege Level for a Command
Beginning in privileged EXEC mode, follow these steps to set the privilege level for a command mode:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
privilege mode level levelcommandSet the privilege level for a command.
enable password level level passwordSpecify the enable password for the privilege level.
• For mode, enter configure for global configuration mode, exec for
EXEC mode, interface for interface configuration mode, or line for
line configuration mode.
• For level, the range is from 0 to 15. Level 1 is for normal user EXEC
mode privileges. Level 15 is the level of access permitted by the
enable password.
• For command, specify the command to which you want to restrict
access.
• For level, the range is from 0 to 15. Level 1 is for normal user EXEC
mode privileges.
• For password, specify a string from 1 to 25 alphanumeric characters.
The string cannot start with a number, is case sensitive, and allows
spaces but ignores leading spaces. By default, no password is
defined.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-6
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 4
Step 5
endReturn to privileged EXEC mode.
show running-config
or
show privilege
Step 6
copy running-config startup-config(Optional) Save your entries in the configuration file.
When you set a command to a privilege level, all commands whose syntax is a subset of that command
are also set to that level. For example, if you set the show ip route command to level 15, the show
commands and show ip commands are automatically set to privilege level 15 unless you set them
individually to different levels.
To return to the default privilege for a given command, use the no privilegemodelevellevelcommand
global configuration command.
This example shows how to set the configure command to privilege level 14 and define SecretPswd14
as the password users must enter to use level 14 commands:
The first command displays the password and access level configuration.
The second command displays the privilege level configuration.
Logging Into and Exiting a Privilege Level
Beginning in privileged EXEC mode, follow these steps to log in to a specified privilege level and to exit
to a specified privilege level:
CommandPurpose
Step 1
enablelevelLog in to a specified privilege level.
For level, the range is 0 to 15.
Step 2
disable levelExit to a specified privilege level.
For level, the range is 0 to 15.
Controlling Bridge Access with RADIUS
This section describes how to control administrator access to the bridge using Remote Authentication
Dial-In User Service (RADIUS). For complete instructions on configuring the bridge to support
RADIUS, see Chapter 11, “Configuring RADIUS and TACACS+ Servers.”
RADIUS provides detailed accounting information and flexible administrative control over
authentication and authorization processes. RADIUS is facilitated through AAA and can be enabled only
through AAA commands.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Security Command Reference for Release 12.2.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
• Configuring RADIUS Authorization for User Privileged Access and Network Services, page 5-11
(optional)
• Displaying the RADIUS Configuration, page 5-12
Default RADIUS Configuration
RADIUS and AAA are disabled by default.
To prevent a lapse in security, you cannot configure RADIUS through a network management
application. When enabled, RADIUS can authenticate users accessing the bridge through the CLI.
Configuring RADIUS Login Authentication
Chapter 5 Administering the Bridge
Step 1
Step 2
To configure AAA authentication, you define a named list of authentication methods and then apply that
list to various interfaces. The method list defines the types of authentication to be performed and the
sequence in which they are performed; it must be applied to a specific interface before any of the defined
authentication methods are performed. The only exception is the default method list (which, by
coincidence, is named default). The default method list is automatically applied to all interfaces except
those that have a named method list explicitly defined.
A method list describes the sequence and authentication methods to be queried to authenticate a user.
You can designate one or more security protocols to be used for authentication, thus ensuring a backup
system for authentication in case the initial method fails. The software uses the first method listed to
authenticate users; if that method fails to respond, the software selects the next authentication method in
the method list. This process continues until there is successful communication with a listed
authentication method or until all defined methods are exhausted. If authentication fails at any point in
this cycle—meaning that the security server or local username database responds by denying the user
access—the authentication process stops, and no other authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure login authentication. This
procedure is required.
CommandPurpose
configure terminalEnter global configuration mode.
aaa new-modelEnable AAA.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-8
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 3
aaa authentication login {default |
list-name} method1 [method2...]
Step 4
line [console | tty | vty] line-number
[ending-line-number]
Step 5
login authentication {default |
list-name}
Step 6
Step 7
Step 8
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Controlling Bridge Access with RADIUS
Create a login authentication method list.
• To create a default list that is used when a named list is not specified
in the login authentication command, use the default keyword
followed by the methods that are to be used in default situations. The
default method list is automatically applied to all interfaces.
• For list-name, specify a character string to name the list you are
creating.
• For method1..., specify the actual method the authentication
algorithm tries. The additional methods of authentication are used
only if the previous method returns an error, not if it fails.
Select one of these methods:
• local—Use the local username database for authentication. You must
enter username information in the database. Use the username password global configuration command.
• radius—Use RADIUS authentication. You must configure the
RADIUS server before you can use this authentication method. For
more information, see the “Identifying the RADIUS Server Host”
section on page 11-4.
Enter line configuration mode, and configure the lines to which you want
to apply the authentication list.
Apply the authentication list to a line or set of lines.
• If you specify default, use the default list created with the aaa
authentication login command.
• For list-name, specify the list created with the aaa authentication
login command.
To disable AAA, use the no aaa new-model global configuration command. To disable AAA
authentication, use the no aaa authentication login {default | list-name} method1 [method2...] global
configuration command. To either disable RADIUS authentication for logins or to return to the default
value, use the no login authentication {default | list-name} line configuration command.
Defining AAA Server Groups
You can configure the bridge to use AAA server groups to group existing server hosts for authentication.
You select a subset of the configured server hosts and use them for a particular service. The server group
is used with a global server-host list, which lists the IP addresses of the selected server hosts.
Server groups also can include multiple host entries for the same server if each entry has a unique
identifier (the combination of the IP address and UDP port number), allowing different ports to be
individually defined as RADIUS hosts providing a specific AAA service. If you configure two different
host entries on the same RADIUS server for the same service (such as accounting), the second
configured host entry acts as a fail-over backup to the first one.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-9
Controlling Bridge Access with RADIUS
You use the server group server configuration command to associate a particular server with a defined
group server. You can either identify the server by its IP address or identify multiple host instances or
entries by using the optional auth-port and acct-port keywords.
Beginning in privileged EXEC mode, follow these steps to define the AAA server group and associate a
particular RADIUS server with it:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
Specify the IP address or host name of the remote RADIUS server host.
• (Optional) For auth-port port-number, specify the UDP destination
port for authentication requests.
• (Optional) For acct-port port-number, specify the UDP destination
port for accounting requests.
• (Optional) For timeout seconds, specify the time interval that the
bridge waits for the RADIUS server to reply before retransmitting.
The range is 1 to 1000. This setting overrides the radius-server timeout global configuration command setting. If no timeout is set
with the radius-server host command, the setting of the
radius-server timeout command is used.
Step 4
Step 5
• (Optional) For retransmit retries, specify the number of times a
RADIUS request is resent to a server if that server is not responding
or responding slowly. The range is 1 to 1000. If no retransmit value is
set with the radius-server host command, the setting of the
radius-server retransmit global configuration command is used.
• (Optional) For key string, specify the authentication and encryption
key used between the bridge and the RADIUS daemon running on the
RADIUS server.
NoteThe key is a text string that must match the encryption key used
on the RADIUS server. Always configure the key as the last item
in the radius-server host command. Leading spaces are ignored,
but spaces within and at the end of the key are used. If you use
spaces in your key, do not enclose the key in quotation marks
unless the quotation marks are part of the key.
To configure the bridge to recognize more than one host entry associated
with a single IP address, enter this command as many times as necessary,
making sure that each UDP port number is different. The bridge software
searches for hosts in the order in which you specify them. Set the timeout,
retransmit, and encryption key values to use with the specific RADIUS
host.
aaa group server radius group-nameDefine the AAA server-group with a group name.
This command puts the bridge in a server group configuration mode.
server ip-address Associate a particular RADIUS server with the defined server group.
Repeat this step for each RADIUS server in the AAA server group.
Each server in the group must be previously defined in Step 2.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-10
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 6
Step 7
Step 8
Step 9
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To remove the specified RADIUS server, use the no radius-server hosthostname | ip-address global
configuration command. To remove a server group from the configuration list, use the no aaa group server radius group-name global configuration command. To remove the IP address of a RADIUS
server, use the no server ip-address server group configuration command.
In this example, the bridge is configured to recognize two different RADIUS group servers (group1 and group2). Group1 has two different host entries on the same RADIUS server configured for the same
services. The second host entry acts as a fail-over backup to the first entry.
bridge(config)# aaa new-model
bridge(config)# radius-server host 172.20.0.1 auth-port 1000 acct-port 1001
bridge(config)# radius-server host 172.10.0.1 auth-port 1645 acct-port 1646
bridge(config)# aaa group server radius group1
bridge(config-sg-radius)# server 172.20.0.1 auth-port 1000 acct-port 1001
bridge(config-sg-radius)# exit
bridge(config)# aaa group server radius group2
bridge(config-sg-radius)# server 172.20.0.1 auth-port 2000 acct-port 2001
bridge(config-sg-radius)# exit
Controlling Bridge Access with RADIUS
Enable RADIUS login authentication. See the “Configuring RADIUS
Login Authentication” section on page 5-8.
Configuring RADIUS Authorization for User Privileged Access and Network
Services
AAA authorization limits the services available to a user. When AAA authorization is enabled, the
bridge uses information retrieved from the user’s profile, which is in the local user database or on the
security server, to configure the user’s session. The user is granted access to a requested service only if
the information in the user profile allows it.
You can use the aaa authorization global configuration command with the radius keyword to set
parameters that restrict a user’s network access to privileged EXEC mode.
The aaa authorization exec radius local command sets these authorization parameters:
• Use RADIUS for privileged EXEC access authorization if authentication was performed by using
RADIUS.
• Use the local database if authentication was not performed by using RADIUS.
NoteAuthorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-11
Controlling Bridge Access with TACACS+
Beginning in privileged EXEC mode, follow these steps to specify RADIUS authorization for privileged
EXEC access and network services:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnter global configuration mode.
aaa authorization network radiusConfigure the bridge for user RADIUS authorization for all
aaa authorization exec radiusConfigure the bridge for user RADIUS authorization to determine if the
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration
command.
Chapter 5 Administering the Bridge
network-related service requests.
user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
Displaying the RADIUS Configuration
To display the RADIUS configuration, use the show running-config privileged EXEC command.
Controlling Bridge Access with TACACS+
This section describes how to control administrator access to the bridge using Terminal Access
Controller Access Control System Plus (TACACS+). For complete instructions on configuring the
bridge to support TACACS+, see Chapter 11, “Configuring RADIUS and TACACS+ Servers.”
TACACS+ provides detailed accounting information and flexible administrative control over
authentication and authorization processes. TACACS+ is facilitated through AAA and can be enabled
only through AAA commands.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
• Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, page
5-14
• Displaying the TACACS+ Configuration, page 5-15
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-12
OL-4059-01
Chapter 5 Administering the Bridge
Default TACACS+ Configuration
TACACS+ and AAA are disabled by default.
To prevent a lapse in security, you cannot configure TACACS+ through a network management
application.When enabled, TACACS+ can authenticate administrators accessing the bridge through the
CLI.
Configuring TACACS+ Login Authentication
To configure AAA authentication, you define a named list of authentication methods and then apply that
list to various interfaces. The method list defines the types of authentication to be performed and the
sequence in which they are performed; it must be applied to a specific interface before any of the defined
authentication methods are performed. The only exception is the default method list (which, by
coincidence, is named default). The default method list is automatically applied to all interfaces except
those that have a named method list explicitly defined. A defined method list overrides the default
method list.
A method list describes the sequence and authentication methods to be queried to authenticate a user.
You can designate one or more security protocols to be used for authentication, thus ensuring a backup
system for authentication in case the initial method fails. The software uses the first method listed to
authenticate users; if that method fails, the software selects the next authentication method in the method
list. This process continues until there is successful communication with a listed authentication method
or until all defined methods are exhausted. If authentication fails at any point in this cycle—meaning that
the security server or local username database responds by denying the user access—the authentication
process stops, and no other authentication methods are attempted.
Beginning in privileged EXEC mode, follow these steps to configure login authentication. This
procedure is required.
Controlling Bridge Access with TACACS+
Step 1
Step 2
CommandPurpose
configure terminalEnter global configuration mode.
aaa new-modelEnable AAA.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-13
Controlling Bridge Access with TACACS+
CommandPurpose
Step 3
aaa authentication login {default |
list-name} method1 [method2...]
Step 4
line [console | tty | vty] line-number
[ending-line-number]
Step 5
login authentication {default |
list-name}
Step 6
Step 7
Step 8
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Chapter 5 Administering the Bridge
Create a login authentication method list.
• To create a default list that is used when a named list is not specified
in the login authentication command, use the default keyword
followed by the methods that are to be used in default situations. The
default method list is automatically applied to all interfaces.
• For list-name, specify a character string to name the list you are
creating.
• For method1..., specify the actual method the authentication
algorithm tries. The additional methods of authentication are used
only if the previous method returns an error, not if it fails.
Select one of these methods:
• local—Use the local username database for authentication. You must
enter username information into the database. Use the username password global configuration command.
• tacacs+—Use TACACS+ authentication. You must configure the
TACACS+ server before you can use this authentication method.
Enter line configuration mode, and configure the lines to which you want
to apply the authentication list.
Apply the authentication list to a line or set of lines.
• If you specify default, use the default list created with the aaa
authentication login command.
• For list-name, specify the list created with the aaa authentication
login command.
To disable AAA, use the no aaa new-model global configuration command. To disable AAA
authentication, use the no aaa authentication login {default | list-name} method1 [method2...] global
configuration command. To either disable TACACS+ authentication for logins or to return to the default
value, use the no login authentication {default | list-name} line configuration command.
Configuring TACACS+ Authorization for Privileged EXEC Access and Network
Services
AAA authorization limits the services available to a user. When AAA authorization is enabled, the
bridge uses information retrieved from the user’s profile, which is located either in the local user
database or on the security server, to configure the user’s session. The user is granted access to a
requested service only if the information in the user profile allows it.
You can use the aaa authorization global configuration command with the tacacs+ keyword to set
parameters that restrict a user’s network access to privileged EXEC mode.
The aaa authorization exec tacacs+ local command sets these authorization parameters:
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-14
OL-4059-01
Chapter 5 Administering the Bridge
• Use TACACS+ for privileged EXEC access authorization if authentication was performed by using
• Use the local database if authentication was not performed by using TACACS+.
NoteAuthorization is bypassed for authenticated users who log in through the CLI even if authorization has
been configured.
Beginning in privileged EXEC mode, follow these steps to specify TACACS+ authorization for
privileged EXEC access and network services:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnter global configuration mode.
aaa authorization network tacacs+Configure the bridge for user TACACS+ authorization for all
aaa authorization exec tacacs+Configure the bridge for user TACACS+ authorization to determine if the
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Configuring the Bridge for Local Authentication and Authorization
TAC AC S+ .
network-related service requests.
user has privileged EXEC access.
The exec keyword might return user profile information (such as
autocommand information).
To disable authorization, use the no aaa authorization {network | exec} method1 global configuration
command.
Displaying the TACACS+ Configuration
To display TACACS+ server statistics, use the show tacacs privileged EXEC command.
Configuring the Bridge for Local Authentication and
Authorization
You can configure AAA to operate without a server by setting the bridge to implement AAA in local
mode. The bridge then handles authentication and authorization. No accounting is available in this
configuration.
Beginning in privileged EXEC mode, follow these steps to configure the bridge for local AAA:
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
aaa new-modelEnable AAA.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-15
Configuring the Bridge for Secure Shell
CommandPurpose
Step 3
Step 4
Step 5
Step 6
aaa authentication login default localSet the login authentication to use the local username database. The
aaa authorization exec localConfigure user AAA authorization to determine if the user is allowed to
aaa authorization network localConfigure user AAA authorization for all network-related service
username name [privilege level]
{password encryption-typepassword}
Step 7
Step 8
Step 9
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Chapter 5 Administering the Bridge
default keyword applies the local user database authentication to all
interfaces.
run an EXEC shell by checking the local database.
requests.
Enter the local database, and establish a username-based authentication
system.
Repeat this command for each user.
• For name, specify the user ID as one word. Spaces and quotation
marks are not allowed.
• (Optional) For level, specify the privilege level the user has after
gaining access. The range is 0 to 15. Level 15 gives privileged EXEC
mode access. Level 0 gives user EXEC mode access.
• For encryption-type, enter 0 to specify that an unencrypted password
follows. Enter 7 to specify that a hidden password follows.
• For password, specify the password the user must enter to gain access
to the bridge. The password must be from 1 to 25 characters, can
contain embedded spaces, and must be the last option specified in the
username command.
To disable AAA, use the no aaa new-model global configuration command. To disable authorization,
use the no aaa authorization {network | exec} method1 global configuration command.
Configuring the Bridge for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature.
NoteFor complete syntax and usage information for the commands used in this section, refer to the “Secure
Shell Commands” section in the Cisco IOS Security Command Reference for Release 12.2.
Understanding SSH
SSH is a protocol that provides a secure, remote connection to a Layer 2 or a Layer 3 device. There are
two versions of SSH: SSH version 1 and SSH version 2. This software release supports only SSH
version 1.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-16
OL-4059-01
Chapter 5 Administering the Bridge
SSH provides more security for remote connections than Telnet by providing strong encryption when a
device is authenticated. The SSH feature has an SSH server and an SSH integrated client. The client
supports these user authentication methods:
• RADIUS (for more information, see the “Controlling Bridge Access with RADIUS” section on
• Local authentication and authorization (for more information, see the “Configuring the Bridge for
For more information about SSH, refer to the “Configuring Secure Shell” section in the Cisco IOS
Security Configuration Guide for Release 12.2.
NoteThe SSH feature in this software release does not support IP Security (IPSec).
Configuring SSH
Before configuring SSH, download the crypto software image from Cisco.com. For more information,
refer to the release notes for this release.
For information about configuring SSH and displaying SSH settings, refer to the “Configuring Secure
Shell” section in the Cisco IOS Security Configuration Guide for Release 12.2.
Managing the System Time and Date
page 5-7)
Local Authentication and Authorization” section on page 5-15)
Managing the System Time and Date
You can manage the system time and date on your bridge automatically, using the Network Time
Protocol (NTP), or manually, by setting the time and date on the bridge.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Configuration Fundamentals Command Reference for Release 12.2.
This section contains this configuration information:
• Understanding the System Clock, page 5-17
• Understanding Network Time Protocol, page 5-18
• Configuring NTP, page 5-19
• Configuring Time and Date Manually, page 5-26
Understanding the System Clock
The heart of the time service is the system clock. This clock runs from the moment the system starts up
and keeps track of the date and time.
The system clock can then be set from these sources:
• Network Time Protocol
• Manual configuration
The system clock can provide time to these services:
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-17
Managing the System Time and Date
• User show commands
• Logging and debugging messages
The system clock determines time internally based on Universal Time Coordinated (UTC), also known
as Greenwich Mean Time (GMT). You can configure information about the local time zone and summer
time (daylight saving time) so that the time is correctly displayed for the local time zone.
The system clock keeps track of whether the time is authoritative or not (that is, whether it has been set
by a time source considered to be authoritative). If it is not authoritative, the time is available only for
display purposes and is not redistributed. For configuration information, see the “Configuring Time and
Date Manually” section on page 5-26.
Understanding Network Time Protocol
The NTP is designed to time-synchronize a network of devices. NTP runs over User Datagram Protocol
(UDP), which runs over IP. NTP is documented in RFC 1305.
An NTP network usually gets its time from an authoritative time source, such as a radio clock or an
atomic clock attached to a time server. NTP then distributes this time across the network. NTP is
extremely efficient; no more than one packet per minute is necessary to synchronize two devices to
within a millisecond of one another.
Chapter 5 Administering the Bridge
NTP uses the concept of a stratum to describe how many NTP hops away a device is from an
authoritative time source. A stratum 1 time server has a radio or atomic clock directly attached, a
stratum 2 time server receives its time through NTP from a stratum 1 time server, and so on. A device
running NTP automatically chooses as its time source the device with the lowest stratum number with
which it communicates through NTP. This strategy effectively builds a self-organizing tree of NTP
speakers.
NTP avoids synchronizing to a device whose time might not be accurate by never synchronizing to a
device that is not synchronized. NTP also compares the time reported by several devices and does not
synchronize to a device whose time is significantly different than the others, even if its stratum is lower.
The communications between devices running NTP (known as associations) are usually statically
configured; each device is given the IP address of all devices with which it should form associations.
Accurate timekeeping is possible by exchanging NTP messages between each pair of devices with an
association. However, in a LAN environment, NTP can be configured to use IP broadcast messages
instead. This alternative reduces configuration complexity because each device can simply be configured
to send or receive broadcast messages. However, in that case, information flow is one-way only.
The time kept on a device is a critical resource; you should use the security features of NTP to avoid the
accidental or malicious setting of an incorrect time. Two mechanisms are available: an access-list-based
restriction scheme and an encrypted authentication mechanism.
Cisco’s implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio
or atomic clock. We recommend that the time service for your network be derived from the public NTP
servers available on the IP Internet. Figure 5-1 shows a typical network example using NTP.
If the network is isolated from the Internet, Cisco’s implementation of NTP allows a device to act as
though it is synchronized through NTP, when in fact it has determined the time by using other means.
Other devices then synchronize to that device through NTP.
When multiple sources of time are available, NTP is always considered to be more authoritative. NTP
time overrides the time set by any other method.
Several manufacturers include NTP software for their host systems, and a publicly available version for
systems running UNIX and its various derivatives is also available. This software allows host systems to
be time-synchronized as well.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-18
OL-4059-01
Chapter 5 Administering the Bridge
Catalyst 3550
switch
Catalyst 3550
switch
Catalyst 3550
switch
Catalyst 3550
switch
These switches are configured in
NTP server mode (server association)
with the Catalyst 6500 series switch.
Catalyst 6500
series switch
(NTP master)
This switch is configured as an NTP
peer to the upstream and downstream
Catalyst 3550 switches.
Catalyst 3550
switch
Workstations
Workstations
Local
workgroup
servers
43269
Figure 5-1Typical NTP Network Configuration
Managing the System Time and Date
Configuring NTP
Cisco Aironet 1400 Series Bridges do not have a hardware-supported clock, and they cannot function as
an NTP master clock to which peers synchronize themselves when an external NTP source is not
available. These bridges also have no hardware support for a calendar. As a result, the ntp update-calendar and the ntp master global configuration commands are not available.
This section contains this configuration information:
• Default NTP Configuration, page 5-20
• Configuring NTP Authentication, page 5-20
• Configuring NTP Associations, page 5-21
• Configuring NTP Broadcast Service, page 5-22
• Configuring NTP Access Restrictions, page 5-23
• Configuring the Source IP Address for NTP Packets, page 5-25
• Displaying the NTP Configuration, page 5-26
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-19
Managing the System Time and Date
Default NTP Configuration
Table 5-2 shows the default NTP configuration.
Table 5-2Default NTP Configuration
FeatureDefault Setting
NTP authenticationDisabled. No authentication key is specified.
NTP peer or server associationsNone configured.
NTP broadcast serviceDisabled; no interface sends or receives NTP broadcast packets.
NTP access restrictionsNo access control is specified.
NTP packet source IP addressThe source address is determined by the outgoing interface.
NTP is disabled by default.
Configuring NTP Authentication
Chapter 5 Administering the Bridge
Step 1
Step 2
Step 3
Step 4
This procedure must be coordinated with the administrator of the NTP server; the information you configure
in this procedure must be matched by the servers used by the bridge to synchronize its time to the NTP server.
Beginning in privileged EXEC mode, follow these steps to authenticate the associations (communications
between devices running NTP that provide for accurate timekeeping) with other devices for security
purposes:
CommandPurpose
configure terminalEnter global configuration mode.
ntp authenticateEnable the NTP authentication feature, which is disabled by
default.
ntp authentication-key number md5 valueDefine the authentication keys. By default, none are defined.
• For number, specify a key number. The range is 1 to
4294967295.
• md5 specifies that message authentication support is provided
by using the message digest algorithm 5 (MD5).
• For value, enter an arbitrary string of up to eight characters for
the key.
The bridge does not synchronize to a device unless both have one
of these authentication keys, and the key number is specified by the
ntp trusted-key key-number command.
ntp trusted-key key-numberSpecify one or more key numbers (defined in Step 3) that a peer
NTP device must provide in its NTP packets for this bridge to
synchronize to it.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-20
By default, no trusted keys are defined.
For key-number, specify the key defined in Step 3.
This command provides protection against accidentally
synchronizing the bridge to a device that is not trusted.
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 5
Step 6
Step 7
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To disable NTP authentication, use the no ntp authenticate global configuration command. To remove
an authentication key, use the no ntp authentication-keynumber global configuration command. To
disable authentication of the identity of a device, use the no ntp trusted-keykey-number global
configuration command.
This example shows how to configure the bridge to synchronize only to devices providing authentication
key 42 in the device’s NTP packets:
An NTP association can be a peer association (this bridge can either synchronize to the other device or
allow the other device to synchronize to it), or it can be a server association (meaning that only this
bridge synchronizes to the other device, and not the other way around).
Beginning in privileged EXEC mode, follow these steps to form an NTP association with another device:
CommandPurpose
configure terminalEnter global configuration mode.
Configure the bridge system clock to synchronize a peer or to be
synchronized by a peer (peer association).
or
Configure the bridge system clock to be synchronized by a time server
(server association).
No peer or server associations are defined by default.
• For ip-address in a peer association, specify either the IP address of
the peer providing, or being provided, the clock synchronization. For
a server association, specify the IP address of the time server
providing the clock synchronization.
• (Optional) For number, specify the NTP version number. The range is
1 to 3. By default, version 3 is selected.
• (Optional) For keyid, enter the authentication key defined with the
ntp authentication-key global configuration command.
OL-4059-01
• (Optional) For interface, specify the interface from which to pick the
IP source address. By default, the source IP address is taken from the
outgoing interface.
• (Optional) Enter the prefer keyword to make this peer or server the
preferred one that provides synchronization. This keyword reduces
switching back and forth between peers and servers.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-21
Managing the System Time and Date
CommandPurpose
Step 3
Step 4
Step 5
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
You need to configure only one end of an association; the other device can automatically establish the
association. If you are using the default NTP version (version 3) and NTP synchronization does not
occur, try using NTP version 2. Many NTP servers on the Internet run version 2.
To remove a peer or server association, use the no ntp peerip-address or the no ntp serverip-address
global configuration command.
This example shows how to configure the bridge to synchronize its system clock with the clock of the
peer at IP address 172.16.22.44 using NTP version 2:
bridge(config)# ntp server 172.16.22.44 version 2
Configuring NTP Broadcast Service
Chapter 5 Administering the Bridge
Step 1
Step 2
Step 3
The communications between devices running NTP (known as associations) are usually statically
configured; each device is given the IP addresses of all devices with which it should form associations.
Accurate timekeeping is possible by exchanging NTP messages between each pair of devices with an
association. However, in a LAN environment, NTP can be configured to use IP broadcast messages
instead. This alternative reduces configuration complexity because each device can simply be configured
to send or receive broadcast messages. However, the information flow is one-way only.
The bridge can send or receive NTP broadcast packets on an interface-by-interface basis if there is an NTP
broadcast server, such as a router, broadcasting time information on the network. The bridge can send NTP
broadcast packets to a peer so that the peer can synchronize to it. The bridge can also receive NTP broadcast
packets to synchronize its own clock. This section provides procedures for both sending and receiving NTP
broadcast packets.
Beginning in privileged EXEC mode, follow these steps to configure the bridge to send NTP broadcast
packets to peers so that they can synchronize their clock to the bridge:
CommandPurpose
configure terminalEnter global configuration mode.
interface interface-idEnter interface configuration mode, and specify the interface to send
Enable the interface to send NTP broadcast packets to a peer.
By default, this feature is disabled on all interfaces.
• (Optional) For number, specify the NTP version number. The
range is 1 to 3. If you do not specify a version, version 3 is used.
Step 4
Step 5
endReturn to privileged EXEC mode.
show running-configVerify your entries.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-22
• (Optional) For keyid, specify the authentication key to use when
sending packets to the peer.
• (Optional) For destination-address, specify the IP address of the
peer that is synchronizing its clock to this bridge.
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 6
Step 7
copy running-config startup-config(Optional) Save your entries in the configuration file.
To disable the interface from sending NTP broadcast packets, use the no ntp broadcast interface
configuration command.
This example shows how to configure an interface to send NTP version 2 packets:
bridge(config)# interface gigabitethernet0/1
bridge(config-if)# ntp broadcast version 2
Beginning in privileged EXEC mode, follow these steps to configure the bridge to receive NTP broadcast
packets from connected peers:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
interface interface-idEnter interface configuration mode, and specify the interface to receive
ntp broadcast clientEnable the interface to receive NTP broadcast packets.
Managing the System Time and Date
Configure the connected peers to receive NTP broadcast packets as
described in the next procedure.
NTP broadcast packets.
Step 4
Step 5
Step 6
Step 7
Step 8
exitReturn to global configuration mode.
ntp broadcastdelay microseconds(Optional) Change the estimated round-trip delay between the bridge and
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To disable an interface from receiving NTP broadcast packets, use the no ntp broadcast client interface
configuration command. To change the estimated round-trip delay to the default, use the no ntp broadcastdelay global configuration command.
This example shows how to configure an interface to receive NTP broadcast packets:
• For access-list-number, enter the number specified in Step 2.
• Enter the permit keyword to permit access if the conditions are
matched.
• For source, enter the IP address of the device that is permitted access
to the bridge.
Chapter 5 Administering the Bridge
Step 4
Step 5
Step 6
• (Optional) For source-wildcard, enter the wildcard bits to be applied
to the source.
NoteWhen creating an access list, remember that, by default, the end
of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
The access group keywords are scanned in this order, from least restrictive to most restrictive:
1. peer—Allows time requests and NTP control queries and allows the bridge to synchronize itself to
a device whose address passes the access list criteria.
2. serve—Allows time requests and NTP control queries, but does not allow the bridge to synchronize
itself to a device whose address passes the access list criteria.
3. serve-only—Allows only time requests from a device whose address passes the access list criteria.
4. query-only—Allows only NTP control queries from a device whose address passes the access list
criteria.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-24
OL-4059-01
Chapter 5 Administering the Bridge
If the source IP address matches the access lists for more than one access type, the first type is granted.
If no access groups are specified, all access types are granted to all devices. If any access groups are
specified, only the specified access types are granted.
To remove access control to the bridge NTP services, use the no ntp access-group {query-only |
serve-only | serve | peer} global configuration command.
This example shows how to configure the bridge to allow itself to synchronize to a peer from access
list 99. However, the bridge restricts access to allow only time requests from access list 42:
NTP services are enabled on all interfaces by default.
Beginning in privileged EXEC mode, follow these steps to disable NTP packets from being received on
an interface:
Managing the System Time and Date
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
interface interface-idEnter interface configuration mode, and specify the interface to disable.
ntp disableDisable NTP packets from being received on the interface.
By default, all interfaces receive NTP packets.
Step 4
Step 5
Step 6
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To re-enable receipt of NTP packets on an interface, use the no ntp disable interface configuration
command.
Configuring the Source IP Address for NTP Packets
When the bridge sends an NTP packet, the source IP address is normally set to the address of the interface
through which the NTP packet is sent. Use the ntp source global configuration command when you want to
use a particular source IP address for all NTP packets. The address is taken from the specified interface. This
command is useful if the address on an interface cannot be used as the destination for reply packets.
Beginning in privileged EXEC mode, follow these steps to configure a specific interface from which the IP
source address is to be taken:
CommandPurpose
Step 1
Step 2
OL-4059-01
configure terminalEnter global configuration mode.
ntp source type numberSpecify the interface type and number from which the IP source address
is taken.
By default, the source address is determined by the outgoing interface.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-25
Managing the System Time and Date
CommandPurpose
Step 3
Step 4
Step 5
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
The specified interface is used for the source address for all packets sent to all destinations. If a source address
is to be used for a specific association, use the source keyword in the ntp peer or ntp server global
configuration command as described in the “Configuring NTP Associations” section on page 5-21.
Displaying the NTP Configuration
You can use two privileged EXEC commands to display NTP information:
• show ntp associations [detail]
• show ntp status
For detailed information about the fields in these displays, refer to the Cisco IOS Configuration
Fundamentals Command Reference for Release 12.1.
Chapter 5 Administering the Bridge
Configuring Time and Date Manually
If no other source of time is available, you can manually configure the time and date after the system is
restarted. The time remains accurate until the next system restart. We recommend that you use manual
configuration only as a last resort. If you have an outside source to which the bridge can synchronize,
you do not need to manually set the system clock.
This section contains this configuration information:
• Setting the System Clock, page 5-27
• Displaying the Time and Date Configuration, page 5-27
• Configuring the Time Zone, page 5-28
• Configuring Summer Time (Daylight Saving Time), page 5-29
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-26
OL-4059-01
Chapter 5 Administering the Bridge
Setting the System Clock
If you have an outside source on the network that provides time services, such as an NTP server, you do
not need to manually set the system clock.
Beginning in privileged EXEC mode, follow these steps to set the system clock:
CommandPurpose
Step 1
Step 2
Step 3
clock set hh:mm:ssdaymonthyear
or
clock set hh:mm:ssmonth day year
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Managing the System Time and Date
Manually set the system clock using one of these formats.
• For hh:mm:ss, specify the time in hours (24-hour format), minutes,
and seconds. The time specified is relative to the configured time
zone.
• For day, specify the day by date in the month.
• For month, specify the month by name.
• For year, specify the year (no abbreviation).
This example shows how to manually set the system clock to 1:32 p.m. on July 23, 2001:
bridge# clock set 13:32:00 23 July 2001
Displaying the Time and Date Configuration
To display the time and date configuration, use the show clock [detail] privileged EXEC command.
The system clock keeps an authoritative flag that shows whether the time is authoritative (believed to be
accurate). If the system clock has been set by a timing source such as NTP, the flag is set. If the time is
not authoritative, it is used only for display purposes. Until the clock is authoritative and the
authoritative flag is set, the flag prevents peers from synchronizing to the clock when the peers’ time is
invalid.
The symbol that precedes the show clock display has this meaning:
• *—Time is not authoritative.
• (blank)—Time is authoritative.
• .—Time is authoritative, but NTP is not synchronized.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-27
Managing the System Time and Date
Configuring the Time Zone
Beginning in privileged EXEC mode, follow these steps to manually configure the time zone:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
clock timezone zone hours-offset
[minutes-offset]
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Chapter 5 Administering the Bridge
Set the time zone.
The bridge keeps internal time in universal time coordinated (UTC), so
this command is used only for display purposes and when the time is
manually set.
• For zone, enter the name of the time zone to be displayed when
standard time is in effect. The default is UTC.
• For hours-offset, enter the hours offset from UTC.
• (Optional) For minutes-offset, enter the minutes offset from UTC.
The minutes-offset variable in the clock timezone global configuration command is available for those
cases where a local time zone is a percentage of an hour different from UTC. For example, the time zone
for some sections of Atlantic Canada (AST) is UTC-3.5, where the 3 means 3 hours and .5 means 50
percent. In this case, the necessary command is clock timezone AST -3 30.
To set the time to UTC, use the no clock timezone global configuration command.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-28
OL-4059-01
Chapter 5 Administering the Bridge
Configuring Summer Time (Daylight Saving Time)
Beginning in privileged EXEC mode, follow these steps to configure summer time (daylight saving time)
in areas where it starts and ends on a particular day of the week each year:
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
clock summer-time zone recurring
[week day month hh:mm week day month
hh:mm [offset]]
Configure summer time to start and end on the specified days every year.
Summer time is disabled by default. If you specify clock summer-timezonerecurring without parameters, the summer time rules default to the
United States rules.
• For zone, specify the name of the time zone (for example, PDT) to be
displayed when summer time is in effect.
• (Optional) For week, specify the week of the month (1 to 5 or last).
• (Optional) For day, specify the day of the week (Sunday, Monday...).
• (Optional) For month, specify the month (January, February...).
• (Optional) For hh:mm, specify the time (24-hour format) in hours and
minutes.
Managing the System Time and Date
Step 3
Step 4
Step 5
• (Optional) For offset, specify the number of minutes to add during
summer time. The default is 60.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
The first part of the clock summer-time global configuration command specifies when summer time
begins, and the second part specifies when it ends. All times are relative to the local time zone. The start
time is relative to standard time. The end time is relative to summer time. If the starting month is after
the ending month, the system assumes that you are in the southern hemisphere.
This example shows how to specify that summer time starts on the first Sunday in April at 02:00 and
ends on the last Sunday in October at 02:00:
bridge(config)# clock summer-time PDT recurring 1 Sunday April 2:00 last Sunday October
2:00
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-29
Managing the System Time and Date
Beginning in privileged EXEC mode, follow these steps if summer time in your area does not follow a
recurring pattern (configure the exact date and time of the next summer time events):
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
clock summer-time zone date [month
date year hh:mm month date year hh:mm
[offset]]
or
clock summer-time zone date [date
month year hh:mm date month year
hh:mm [offset]]
Step 3
Step 4
Step 5
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Chapter 5 Administering the Bridge
Configure summer time to start on the first date and end on the second
date.
Summer time is disabled by default.
• For zone, specify the name of the time zone (for example, PDT) to be
displayed when summer time is in effect.
• (Optional) For week, specify the week of the month (1 to 5 or last).
• (Optional) For day, specify the day of the week (Sunday, Monday...).
• (Optional) For month, specify the month (January, February...).
• (Optional) For hh:mm, specify the time (24-hour format) in hours and
minutes.
• (Optional) For offset, specify the number of minutes to add during
summer time. The default is 60.
The first part of the clock summer-time global configuration command specifies when summer time
begins, and the second part specifies when it ends. All times are relative to the local time zone. The start
time is relative to standard time. The end time is relative to summer time. If the starting month is after
the ending month, the system assumes that you are in the southern hemisphere.
To disable summer time, use the no clock summer-time global configuration command.
This example shows how to set summer time to start on October 12, 2000, at 02:00, and end on April 26,
2001, at 02:00:
bridge(config)# clock summer-time pdt date 12 October 2000 2:00 26 April 2001 2:00
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-30
OL-4059-01
Chapter 5 Administering the Bridge
Configuring a System Name and Prompt
You configure the system name on the bridge to identify it. By default, the system name and prompt are
bridge.
If you have not configured a system prompt, the first 20 characters of the system name are used as the
system prompt. A greater-than symbol (>) is appended. The prompt is updated whenever the system
name changes, unless you manually configure the prompt by using the prompt global configuration
command.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Configuration Fundamentals Command Reference and the Cisco IOS IP and IP Routing Command
Reference for Release 12.1.
This section contains this configuration information:
• Default System Name and Prompt Configuration, page 5-31
• Configuring a System Name, page 5-31
Configuring a System Name and Prompt
• Understanding DNS, page 5-32
Default System Name and Prompt Configuration
The default bridge system name and prompt is bridge.
Configuring a System Name
Beginning in privileged EXEC mode, follow these steps to manually configure a system name:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
hostname nameManually configure a system name.
The default setting is bridge.
The name must follow the rules for ARPANET host names. They must start
with a letter, end with a letter or digit, and have as interior characters only
letters, digits, and hyphens. Names can be up to 63 characters.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
When you set the system name, it is also used as the system prompt.
To return to the default host name, use the no hostname global configuration command.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-31
Configuring a System Name and Prompt
Understanding DNS
The DNS protocol controls the Domain Name System (DNS), a distributed database with which you can
map host names to IP addresses. When you configure DNS on your bridge, you can substitute the host
name for the IP address with all IP commands, such as ping, telnet, connect, and related Telnet support
operations.
IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain.
Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco
Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, such as the File Transfer Protocol (FTP) system, is
identified as ftp.cisco.com.
To keep track of domain names, IP has defined the concept of a domain name server, which holds a cache
(or database) of names mapped to IP addresses. To map domain names to IP addresses, you must first
identify the host names, specify the name server that is present on your network, and enable the DNS.
This section contains this configuration information:
• Default DNS Configuration, page 5-32
• Setting Up DNS, page 5-32
• Displaying the DNS Configuration, page 5-33
Chapter 5 Administering the Bridge
Default DNS Configuration
Table 5-3 shows the default DNS configuration.
Table 5-3Default DNS Configuration
FeatureDefault Setting
DNS enable stateDisabled.
DNS default domain nameNone configured.
DNS serversNo name server addresses are configured.
Setting Up DNS
Beginning in privileged EXEC mode, follow these steps to set up your bridge to use the DNS:
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
ip domain-name nameDefine a default domain name that the software uses to complete unqualified
host names (names without a dotted-decimal domain name).
Do not include the initial period that separates an unqualified name from the
domain name.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-32
At boot time, no domain name is configured; however, if the bridge
configuration comes from a BOOTP or Dynamic Host Configuration Protocol
(DHCP) server, then the default domain name might be set by the BOOTP or
DHCP server (if the servers were configured with this information).
OL-4059-01
Chapter 5 Administering the Bridge
CommandPurpose
Step 3
Step 4
Step 5
Step 6
Step 7
ip name-serverserver-address1
[server-address2 ... server-address6]
ip domain-lookup(Optional) Enable DNS-based host name-to-address translation on your bridge.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config
startup-config
Creating a Banner
Specify the address of one or more name servers to use for name and address
resolution.
You can specify up to six name servers. Separate each server address with a
space. The first server specified is the primary server. The bridge sends DNS
queries to the primary server first. If that query fails, the backup servers are
queried.
This feature is enabled by default.
If your network devices require connectivity with devices in networks for which
you do not control name assignment, you can dynamically assign device names
that uniquely identify your devices by using the global Internet naming scheme
(DNS).
(Optional) Save your entries in the configuration file.
If you use the bridge IP address as its host name, the IP address is used and no DNS query occurs. If you
configure a host name that contains no periods (.), a period followed by the default domain name is
appended to the host name before the DNS query is made to map the name to an IP address. The default
domain name is the value set by the ip domain-name global configuration command. If there is a
period (.) in the host name, the IOS software looks up the IP address without appending any default
domain name to the host name.
To remove a domain name, use the no ip domain-namename global configuration command. To remove
a name server address, use the no ip name-serverserver-address global configuration command. To
disable DNS on the bridge, use the no ip domain-lookup global configuration command.
Displaying the DNS Configuration
To display the DNS configuration information, use the show running-config privileged EXEC
command.
Creating a Banner
You can configure a message-of-the-day (MOTD) and a login banner. The MOTD banner appears on all
connected terminals at login and is useful for sending messages that affect all network users (such as
impending system shutdowns).
The login banner also appears on all connected terminals. It appears after the MOTD banner and before
the login prompts.
NoteFor complete syntax and usage information for the commands used in this section, refer to the Cisco IOS
Configuration Fundamentals Command Reference for Release 12.2.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-33
Creating a Banner
This section contains this configuration information:
• Default Banner Configuration, page 5-34
• Configuring a Message-of-the-Day Login Banner, page 5-34
• Configuring a Login Banner, page 5-35
Default Banner Configuration
The MOTD and login banners are not configured.
Configuring a Message-of-the-Day Login Banner
You can create a single or multiline message banner that appears on the screen when someone logs into
the bridge.
Beginning in privileged EXEC mode, follow these steps to configure a MOTD login banner:
Chapter 5 Administering the Bridge
Step 1
Step 2
Step 3
Step 4
Step 5
CommandPurpose
configure terminalEnter global configuration mode.
banner motd c message cSpecify the message of the day.
For c, enter the delimiting character of your choice, such as a pound sign
(#), and press the Return key. The delimiting character signifies the
beginning and end of the banner text. Characters after the ending
delimiter are discarded.
For message, enter a banner message up to 255 characters. You cannot
use the delimiting character in the message.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
To delete the MOTD banner, use the no banner motd global configuration command.
This example shows how to configure a MOTD banner for the bridge using the pound sign (#) symbol
as the beginning and ending delimiter:
bridge(config)# banner motd #
This is a secure site. Only authorized users are allowed.
For access, contact technical support.
#
bridge(config)#
This example shows the banner displayed from the previous configuration:
Unix> telnet 172.2.5.4
Trying 172.2.5.4...
Connected to 172.2.5.4.
Escape character is '^]'.
This is a secure site. Only authorized users are allowed.
For access, contact technical support.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-34
OL-4059-01
Chapter 5 Administering the Bridge
User Access Verification
Password:
Configuring a Login Banner
You can configure a login banner to appear on all connected terminals. This banner appears after the
MOTD banner and before the login prompt.
Beginning in privileged EXEC mode, follow these steps to configure a login banner:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
banner login c message cSpecify the login message.
endReturn to privileged EXEC mode.
show running-configVerify your entries.
copy running-config startup-config(Optional) Save your entries in the configuration file.
Creating a Banner
For c, enter the delimiting character of your choice, such as a pound sign
(#), and press the Return key. The delimiting character signifies the
beginning and end of the banner text. Characters after the ending delimiter
are discarded.
For message, enter a login message up to 255 characters. You cannot use the
delimiting character in the message.
To delete the login banner, use the no banner login global configuration command.
This example shows how to configure a login banner for the bridge using the dollar sign ($) symbol as
the beginning and ending delimiter:
bridge(config)# banner login $
Access for authorized users only. Please enter your username and password.
$
bridge(config)#
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-35
Creating a Banner
Chapter 5 Administering the Bridge
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
5-36
OL-4059-01
CHA P TER
6
Configuring Radio Settings
This chapter describes how to configure radio settings for your bridge. This chapter includes these
sections:
• Disabling and Enabling the Radio Interface, page 6-2
• Configuring the Role in Radio Network, page 6-2
• Configuring the Radio Distance Setting, page 6-3
• Configuring Radio Data Rates, page 6-3
• Configuring Radio Transmit Power, page 6-4
• Configuring Radio Channel Settings, page 6-5
• Disabling and Enabling Aironet Extensions, page 6-6
• Configuring the Ethernet Encapsulation Transformation Method, page 6-6
• Configuring the Beacon Period, page 6-6
• Configuring RTS Threshold and Retries, page 6-7
• Configuring the Maximum Data Retries, page 6-7
OL-4059-01
• Configuring the Fragmentation Threshold, page 6-8
• Configuring Packet Concatenation, page 6-8
• Performing a Carrier Busy Test, page 6-9
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-1
Disabling and Enabling the Radio Interface
SwitchSwitch
Non-Root
Bridge
Root Bridge
Disabling and Enabling the Radio Interface
The bridge radio is enabled by default. Beginning in privileged EXEC mode, follow these steps to
disable the bridge radio:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
shutdownDisable the radio port.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Use the no form of the shutdown command to enable the radio port.
Configuring the Role in Radio Network
Chapter 6 Configuring Radio Settings
Step 1
Step 2
Step 3
Step 4
Step 5
You can configure your bridge as a root bridge or as a non-root bridge. Figure 6-1 shows a root bridge
communicating with a non-root bridge in a point-to-point configuration.
Figure 6-1Point-to-Point Bridge Configuration
Beginning in privileged EXEC mode, follow these steps to set the bridge’s radio network role:
CommandPurpose
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
station-role bridge
{ root | non-root | install }
Set the bridge role.
• Set the role to root or non-root, or put the bridge in
installation mode to help align the antennas. In installation
mode, the bridge polls the radio for the received signal
strength indication (RSSI) value and updates the LEDs and
the RSSI voltage port.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-2
OL-4059-01
Chapter 6 Configuring Radio Settings
Configuring the Radio Distance Setting
Use the distance command to specify the distance from a root bridge to the non-root bridges with which
it communicates. The distance setting adjusts the bridge’s timeout values to account for the time required
for radio signals to travel from bridge to bridge. If more than one non-root bridge communicates with
the root bridge, enter the distance from the root bridge to the non-root bridge that is farthest away. Enter
a value from 0 to 99 km. You do not need to adjust this setting on non-root bridges.
In installation mode, the default distance setting is 99 km. In other modes, the default distance setting is
0 km.
Beginning in privileged EXEC mode, follow these steps to configure the bridge distance setting:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
distance kilometers Enter a distance setting from 0 to 99 km.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Configuring the Radio Distance Setting
Use the no form of the distance command to return to the default distance setting.
Configuring Radio Data Rates
You use the data rate settings to choose the data rates the bridge uses for data transmission. The rates are
expressed in megabits per second. The bridge always attempts to transmit at the highest data rate set to
Basic, also called Require on the browser-based interface. If there are obstacles or interference, the
bridge steps down to the highest rate that allows data transmission. You can set each data rate to one of
three states:
• Basic (this is the default state for all data rates)—Allows transmission at this rate for all packets,
both unicast and multicast. At least one of the bridge's data rates must be set to Basic.
• Enabled—The bridge transmits only unicast packets at this rate; multicast packets are sent at one of
the data rates set to Basic.
• Disabled—The bridge does not transmit data at this rate.
NoteAt least one data rate must be set to basic.
You can use the Data Rate settings to set up the bridge to operate at specific data rates. For example, to
configure the bridge to operate at 54 megabits per second (Mbps) service only, set the 54-Mbps rate to
Basic and set the other data rates to Enabled. To set up the bridge to operate at 24, 48, and 54 Mbps, set
24, 48, and 54 to Basic and set the rest of the data rates to Enabled.
You can also configure the bridge to set the data rates automatically to optimize either range or
throughput. When you enter range for the data rate setting, the bridge sets the 6-Mbps rate to basic and
the other rates to enabled. When you enter throughput for the data rate setting, the bridge sets all data
rates to basic.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-3
Configuring Radio Transmit Power
Beginning in privileged EXEC mode, follow these steps to configure the radio data rates:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Chapter 6 Configuring Radio Settings
Set each data rate to basic or enabled, or enter range to
optimize bridge range or throughput to optimize throughput.
• (Optional) Enter 6.0, 9.0, 12.0, 18.0, 24.0, 36.0, 48.0, and
54.0 to set these data rates to enabled.
• (Optional) Enter basic-6.0, basic-9.0, basic-12.0,
basic-18.0, basic-24.0, basic-36.0, basic-48.0, and
basic-54.0 to set these data rates to basic.
• (Optional) Enter range or throughput to automatically
optimize radio range or throughput. When you enter
range, the bridge sets the lowest data rate to basic and the
other rates to enabled. When you enter throughput, the
bridge sets all data rates to basic.
Use the no form of the speed command to disable data rates. When you use the no form of the command,
all data rates are disabled except the rates you name in the command. This example shows how to disable
data rate 6.0:
Data rate 54 is set to basic, and the rest of the data rates are set to enabled.
Configuring Radio Transmit Power
Beginning in privileged EXEC mode, follow these steps to set the transmit power on your bridge radio:
CommandPurpose
Step 1
Step 2
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-4
OL-4059-01
Chapter 6 Configuring Radio Settings
CommandPurpose
Step 3
Step 4
Step 5
power local
{ 12 | 15 | 18 | 21 | 22 | 23 | 24
maximum }
Set the transmit power to one of the power levels allowed in
your regulatory domain. All settings are in dBm.
NoteThe settings allowed in your regulatory domain might
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Use the no form of the power command to return the power setting to maximum, the default setting.
Configuring Radio Channel Settings
The default channel setting for the bridge radios is least congested; at startup, the bridge scans for and
selects the least-congested channel. For most consistent performance after a site survey, however, we
recomend that you assign a static channel setting for each bridge. The channel settings on your bridge
correspond to the frequencies available in your regulatory domain. See Appendix A, “Channels and
Antenna Settings,” for the frequencies allowed in your domain.
Configuring Radio Channel Settings
differ from the settings listed here.
Step 1
Step 2
Step 3
Step 4
Step 5
The 5-GHz radio operates on four channels from 5745 to 5805 MHz. Each channel covers 20 MHz, and
the bandwidth for the channels overlaps slightly. For best performance, use channels that are not adjacent
(such as 5745 and 5785) for bridges that are close to each other.
Beginning in privileged EXEC mode, follow these steps to set the bridge’s radio channel:
CommandPurpose
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
channel
frequency | least-congested
Set the default channel for the bridge radio. To search for the
least-congested channel on startup, enter least-congested.
• channel 149—5745
• channel 153—5765
• channel 157—5785
• channel 161—5805
NoteThe frequencies allowed in your regulatory domain might
differ from the frequencies listed here.
endReturn to privileged EXEC mode.
copy running-config
(Optional) Save your entries in the configuration file.
startup-config
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-5
Chapter 6 Configuring Radio Settings
Disabling and Enabling Aironet Extensions
Disabling and Enabling Aironet Extensions
By default, the bridge uses Cisco Aironet 802.11 extensions to improve communication with other 1400
series bridges. You cannot disable Aironet extensions on the bridge.
Configuring the Ethernet Encapsulation Transformation Method
When the bridge receives data packets that are not 802.3 packets, the bridge must format the packets to
802.3 using an encapsulation transformation method. These are the two transformation methods:
• 802.1H
• RFC1042—This is the default setting. Use this setting to ensure interoperability with non-Cisco
Aironet wireless equipment.
• Beginning in privileged EXEC mode, follow these steps to configure the encapsulation
transformation method:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
interface dot11radio { 0 | 1 }Enter interface configuration mode for the radio interface. The
2.4-GHz radio is radio 0, and the 5-GHz radio is radio 1.
payload-encapsulation
snap | dot1h
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Set the encapsulation transformation method to RFC1042
(snap) or 802.1h (dot1h).
Configuring the Beacon Period
The beacon period is the amount of time between bridge beacons in Kilomicroseconds. One Kµsec
equals 1,024 microseconds. The default beacon period is 100. Beginning in privileged EXEC mode,
follow these steps to configure the beacon period:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-6
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
beacon period value Set the beacon period. Enter a value in Kilomicroseconds.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
NoteThe bridge does not support the dtim option in the
beacon period command.
OL-4059-01
Chapter 6 Configuring Radio Settings
Configuring RTS Threshold and Retries
The RTS threshold determines the packet size at which the bridge issues a request to send (RTS) before
sending the packet. You can enter a setting ranging from 0 to 4000 bytes. If your bridge link is a
point-to-point configuration, set the RTS threshold to 4000 on both the root and non-root bridges. If you
have multiple bridges set up in a point-to-multipoint configuration, set the RTS threshold to 4000 on the
root bridge and to 0 on the non-root bridges.
Maximum RTS Retries is the maximum number of times the bridge issues an RTS before stopping the
attempt to send the packet over the radio. Enter a value from 1 to 128.
The default RTS threshold is 4000, and the default maximum RTS retries setting is 32. Beginning in
privileged EXEC mode, follow these steps to configure the RTS threshold and maximum RTS retries:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
rts threshold valueSet the RTS threshold. Enter an RTS threshold from 0 to 4000.
rts retries valueSet the maximum RTS retries. Enter a setting from 1 to 128.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Configuring RTS Threshold and Retries
Use the no form of the command to reset the RTS settings to defaults.
Configuring the Maximum Data Retries
The maximum data retries setting determines the number of attempts the bridge makes to send a packet
before giving up and dropping the packet.
The default setting is 32. Beginning in privileged EXEC mode, follow these steps to configure the
maximum data retries:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
packet retries valueSet the maximum data retries. Enter a setting from 1 to 128.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Use the no form of the command to reset the setting to defaults.
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-7
Configuring the Fragmentation Threshold
Configuring the Fragmentation Threshold
The fragmentation threshold determines the size at which packets are fragmented (sent as several pieces
instead of as one block). Do not configure a fragmentation threshold that is lower than the concatenation
size, because the settings can conflict. If concatenation is disabled, use a low setting in areas where
communication is poor or where there is a great deal of radio interference.
The default setting is 4000 bytes. Beginning in privileged EXEC mode, follow these steps to configure
the fragmentation threshold:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
fragment-threshold valueSet the fragmentation threshold. Enter a setting from 256 to
4000 bytes.
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
Chapter 6 Configuring Radio Settings
Use the no form of the command to reset the setting to defaults.
Configuring Packet Concatenation
If your bridge often transmits bursts of data, such as voice packets, you can enable packet concatenation
to improve throughput. Concatenation is enabled by default to improve throughput.
NoteNot all devices connected through the bridge from the Ethernet LAN can support packet concatenation,
such as third party wireless clients connected to access points. Prior to configuring the packet
concatenation feature, ensure all your network devices support packet concatenation. Also ensure that
all bridges are running Cisco IOS Release 12.2(11)JA or later. If connectivity problems develop after
implementing packet concatenation, deactivate the concatenation feature to determine if that is the cause
of the problem.
Beginning in privileged EXEC mode, follow these steps to configure packet concatenation:
CommandPurpose
Step 1
Step 2
Step 3
configure terminalEnter global configuration mode.
interface dot11radio 0Enter interface configuration mode for the radio interface.
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-8
endReturn to privileged EXEC mode.
copy running-config startup-config (Optional) Save your entries in the configuration file.
(Optional) Set a maximum size for concatenated packets in
bytes. Enter a value from 1600 to 4000. When concatenation is
enabled, the default packet size is 3500.
OL-4059-01
Chapter 6 Configuring Radio Settings
Use the no form of the command to disable packet concatenation.
NoteFor best performance over your bridge links, adjust the CW-min and CW-max contention window
settings to depending on the number of non-root bridges associated to each root bridge. Refer to the
“CW-min and CW-max Settings for Point-to-Point and Point-to-Multipoint Bridge Links” section on
page 13-9 for instructions on adjusting these settings.
Performing a Carrier Busy Test
You can perform a carrier busy test to check the radio activity on bridge channels. During the carrier
busy test, the bridge drops all associations with wireless networking devices for around 4 seconds while
it conducts the carrier test and then displays the test results.
In privileged EXEC mode, enter this command to perform a carrier busy test:
dot11 interface-number carrier busy
Use the show dot11 carrier busy command to re-display the carrier busy test results.
Performing a Carrier Busy Test
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-9
Performing a Carrier Busy Test
Chapter 6 Configuring Radio Settings
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
6-10
OL-4059-01
CHA P TER
7
Configuring SSIDs
This chapter describes how to configure a service set identifier (SSID) on the bridge. This chapter
contains these sections:
• Understanding SSIDs, page 7-2
• Configuring the SSID, page 7-2
OL-4059-01
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
7-1
Understanding SSIDs
Understanding SSIDs
The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless
connectivity. Multiple bridges on a network or sub-network can use the same SSID. SSIDs are case
sensitive and can contain up to 32 alphanumeric characters. Do not include spaces in your SSID. Unlike
Cisco Aironet Access Points, 1400 series bridges do not support multiple SSIDs. The bridge can only
associate to another bridge, so you do not need to configure multiple SSIDs.
When you configure an SSID you assign these configuration settings to the SSID:
• VLAN
• RADIUS accounting for traffic using the SSID
• Bridge authentication method
NoteFor detailed information on client authentication types, see Chapter 10, “Configuring
Authentication Types.”
If you want the bridge to allow associations from bridges that do not specify an SSID in their
configurations, you can include the SSID in the bridge’s beacon. The bridge’s default SSID, autoinstall,
is included in the beacon. However, to keep your network secure, you should remove the SSID from the
beacon.
You can assign an authentication username and password to the SSID to allow the bridge to authenticate
to your network using LEAP authentication.
If your network uses VLANs, you should assign the bridge SSID to your network’s native VLAN.
Chapter 7 Configuring SSIDs
Configuring the SSID
These sections contain configuration information for the SSID:
• Default SSID Configuration, page 7-2
• Creating an SSID, page 7-3
Default SSID Configuration
Table 7-1 shows the default SSID configuration:
Table 7-1Default SSID Configuration
FeatureDefault Setting
SSIDautoinstall
Guest Mode SSIDautoinstall (The bridge broadcasts this SSID in its
beacon and allows bridges with no SSID to
associate.)
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
7-2
OL-4059-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.