Guest

Cisco Aironet 1300 Series

Quick Start Guide Cisco Aironet 1300 Series Outdoor Access Point

  • Viewing Options

  • PDF (202.4 KB)
  • Feedback
Read This First

Table Of Contents

Read This First

Important Information

Cisco IOS Release 12.2(15)JA and Earlier

Cisco IOS Release 12.3(2)JA

Cisco IOS Release 12.3(4)JA and Later

Enabling the Radio Interfaces

Checking the LEDs

Related Documents

Before You Begin

Resetting the Access Point/Bridge to Default Settings

Using the Web-Browser Interface

Using the CLI

Obtaining and Assigning an IP Address

Assigning an IP Address Using the CLI

Using a Telnet Session to Access the CLI

Assigning Basic Settings

Configuring Security Settings

Understanding Express Security Settings

Express Security Limitations

Configuring Advanced Parameters

Cisco One-Year Limited Hardware Warranty Terms


Read This First

This guide is designed to help you quickly set up and configure your Cisco Aironet 1300 Series Outdoor Access Point/Bridge.

This guide does not cover mounting the access point/bridge or establishing a bridge link. Those subjects are covered in the Cisco Aironet 1300 Series Outdoor Access Point/Bridge Mounting Instructions, which shipped with your access point/bridge. You must complete the procedures in the mounting instruction document and then use this guide to initially configure the access point/bridge to connect to your LAN.

Important Information

Recent Cisco IOS releases have changed the way an unconfigured access point/bridge behaves when booted for the first time. This section describes this behavior and provides instructions on how to open` the access point's configuration pages.

Cisco IOS Release 12.2(15)JA and Earlier

Setting
Default
Remarks

Login/Password

Cisco/Cisco

Case-sensitive

SSID

autoinstall

Radio status

Enabled

Roll in Radio Network

Root bridge

IP Address

Assigned by DHCP

If DHCP disabled, the default IP address is 10.0.0.1. See the "Assigning Basic Settings" section on page 18 for additional information.


Cisco IOS Release 12.3(2)JA

Setting
Default
Remarks

Login/Password

Cisco/Cisco

Case-sensitive

SSID

autoinstall

Case-sensitive

Radio status

Enabled

Role in Radio Network

Root bridge

IP Address

Assigned by DHCP

If DHCP disabled, the access point continues to send DHCP requests indefinitely. To assign an IP address, you must access the unit's console port. See the "Using the CLI" section on page 14 for additional information.


Cisco IOS Release 12.3(4)JA and Later

Setting
Default
Remarks

Login/Password

Cisco/Cisco

Case-sensitive

SSID

None assigned

You must create an SSID. See the "Assigning an IP Address Using the CLI" section on page 16

Radio status

disabled

You must enable the radio interfaces. "Enabling the Radio Interfaces" section on page 5 for additional information.

Role in Radio Network

Root AP

IP Address

Assigned by DHCP

If DHCP is disabled, the access point continues to send DHCP requests indefinitely. To assign an IP address, you must access the unit's console port. See the "Using the CLI" section on page 14 for additional information.


Enabling the Radio Interfaces

In Cisco IOS Release 12.3(4)JA and later, the access point/bridge radio is disabled by default, and there is no SSID. You must create an SSID and enable the radios before the access point/bridge will allow wireless associations from other devices. These changes to the default configuration improve the security of newly installed access point/bridges.

To enable the radio interfaces using the access point/bridge's graphical user interface (GUI), follow these instructions:

1. Use your internet browser to access your access point. The default login and password is Cisco. Both are case-sensitive.

2. When the Summary Status page displays, choose Express > SSID Manager. The Global SSID Manager page appears.

3. Create an SSID for each radio interface. An SSID can be any alphanumeric, case-sensitive entry from 2 to 32 characters. The following six characters are not allowed: ?, ", $. [. \, and +. In addition, the following three characters cannot be the first character: !, #, and ;.

4. Click Apply.

5. Choose Network Interface > Radio 802.11g and the Radio Status page appears.

6. Click Settings and the Radio Settings Page appears.

7. Click Enable in the Enable Radio field.

8. Click Apply.

9. Close your internet browser.


Note You can enable the radios using the access point's command line interface (CLI). See the Cisco IOS Software Configuration Guide for Cisco Aironet Access Points for additional information.


Checking the LEDs

The access point/bridge has four LEDs on its back panel that provide operational information about the access point/bridge. See the following illustration.

R

Radio LED

S

Status LED

E

Ethernet LED

I

Install LED


The following table shows normal mode LED indications.


Note For detailed information about the LEDs, see the Cisco Aironet 1300 Series Outdoor Access Point/Bridge Hardware Installation Guide.

Ethernet LED
Status
LED
Radio
LED
Meaning

Off

Ethernet link is down or disabled.

Blinking green

Transmitting and receiving Ethernet packets.

Blinking amber

Transmitting and receiving Ethernet errors.

Amber

Firmware error.

Blinking green

Root bridge mode—no remote bridges associated.
Non-root bridge—not associated to the root bridge.

Green

Root mode—associated to at least one remote bridge.
Non-root mode—associated to the root bridge.

 

Blinking amber

General warning.

Red

Amber

Red

Loading Firmware error.

Blinking green

Transmitting and receiving radio packets—normal operation.

Blinking amber

Maximum retries or buffer full occurred on radio interface.

   

Amber

Radio firmware error.




Note The access point/bridge uses a blinking code to identify various error conditions. See the Cisco Aironet 1300 Outdoor Access Point/ Bridge Hardware Installation Guide for a detailed description of the codes.


Related Documents

The following document provides detailed information about installing your access point/bridge:

Cisco Aironet 1300 Series Outdoor Access Point/Bridge Hardware Installation Guide

This guide provides instructions for configuring your access point/bridge using its graphical user interface (GUI). You may also configure the access point/bridge through its console port to access the command line interface (CLI) and issue IOS commands. If you choose to use the CLI, please refer to the following documents for additional information and instructions:

Cisco Aironet 1300 Series Outdoor Access Point/Bridge Software Configuration Guide

Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges

In addition to the integrated antenna, the access point/bridge can be used with existing certified Cisco Aironet 2.4-GHz antennas. If you are using an optional external antenna, please refer to the applicable documentation for the specific antenna. Antenna documentation is shipped with the antenna.

With the exception of this guide, the documents identified in this section are available on Cisco.com. Follow this link to access them:

http://www.cisco.com/en/US/products/ps5861/tsd_products_support_series_home.html

Before You Begin

Before you configure the access point/bridge, make sure you are using a computer connected to the same network as the access point/bridge, and obtain the following information from your network administrator:

A host name (system name) for the access point/bridge

The case-sensitive wireless service set identifier (SSID) that your access point/bridges use

If your access point/bridge is not connected to a DHCP server, a unique IP address for it

If the access point/bridge is not on the same subnet as your PC, a default gateway address and subnet mask

A Simple Network Management Protocol (SNMP) community name and the SNMP file attribute (if SNMP is in use)

If you use IPSU to find or assign the access point/bridge IP address, the MAC address from the product label on the access point/bridge (such as 00164625854c)

Resetting the Access Point/Bridge to Default Settings

You can use the web-browser interface or the CLI to reset the access point/bridge to a factory default configuration.


Note The following steps reset all configuration settings to factory defaults, including passwords, WEP keys, the IP address, and the SSID.


Using the Web-Browser Interface

Follow the steps below to delete the current configuration and return all access point/bridge settings to the factory defaults using the Web-browser interface.

1. Open your Internet browser.

2. Enter the access point/bridge's IP address in the browser address or location line and press Enter. An Enter Network Password window appears.

3. Enter your username (default Cisco) in the User Name field.

4. Enter the bridge password (default Cisco) in the Password field and press Enter. The Summary Status page appears.

5. Click System Software and the System Software window appears.

6. Click System Configuration and the System Configuration window appears.

7. Click Reset to Defaults. A warning appears prompting you to turn off any popup blocking software on your system.

8. Click OK. The system restarts.


Note If the bridge is configured with a static IP address, the IP address does not change.


9. After the bridge reboots, you can reconfigure the bridge by using the Web-browser interface or the CLI (refer to the Cisco IOS Software Configuration Guide for Cisco Aironet Bridges or to the Cisco IOS Software Configuration Guide for Cisco Aironet Access Points).

Using the CLI

From the privileged EXEC mode, you can reset the access point/bridge configuration to factory default values using the CLI by following these steps:

1. Enter erase nvram to erase all NVRAM files including the startup configuration.

2. Enter Y when the following CLI message appears: Erasing the nvram filesystem will remove all configuration files! Continue? [confirm].

3. Enter reload when the following CLI message appears: Erase of nvram: complete. This command reloads the operating system.

4. Enter Y when the following CLI message appears: Proceed with reload? [confirm].


Caution Do not interrupt the boot process or the configuration file will be damaged. Wait until the access point/bridge Install Mode LED begins to blink green before continuing with CLI configuration changes. You will see the following CLI message when the load process has finished: Line protocal on Interface Dot11Radio0, changed state to up.

5. After the access point/bridge reboots, you can reconfigure it with the Web-browser interface or the CLI.

The access point/bridge is configured with the factory default values including the IP address (set to receive an IP address using DHCP). To obtain the access point/bridge's new IP address, you can use the show interface bvi1 CLI command.

Obtaining and Assigning an IP Address

To browse to the access point/bridge's Express Setup page, you must either obtain or assign the access point/bridge's IP address using one of the following methods:

Use a DHCP server (if available) to automatically assign an IP address. You can find out the DHCP-assigned IP address using one of the following methods:

Provide your organization's network administrator with your access point's MAC address.

Use the console port to identify the assigned address or assign one manually.

Assigning an IP Address Using the CLI

When you connect the access point to the wired LAN, the access point/bridge links to the network using a bridge virtual interface (BVI) that it creates automatically. Instead of tracking separate IP addresses for the access point's Ethernet and radio ports, the network uses the BVI.

When you assign an IP address to the access point/bridge using the CLI, you must assign the address to the BVI. Beginning in a privileged EXEC mode, follow these steps to assign an IP address to the access point/bridge's BVI:

 
Command
Purpose
Step 1

configure terminal

Enters global configuration mode.

Step 2

Interface bvi1

Enters interface configuration mode for the BVI.

Step 3

ip address address mask

Assigns an IP address and subnet mask address to the BVI.



Note If you used a Telnet session to connect to the access point, you lose your connection when you assign a new IP address to the BVI. If you need to continue configuring the access point using Telnet, use the new IP address to open another Telnet session to the access point.


Using a Telnet Session to Access the CLI

Follow these steps to access the CLI using a Telnet session. These steps are for a PC running Microsoft Windows with a Telnet terminal application. Check your PC operating instructions for detailed instructions.

1. Choose Start > Programs > Accessories > Telnet.

If Telnet is not listed in your Accessories menu, choose Start > Run, type Telnet in the entry field, and press Enter.

2. When the Telnet window appears, click Connect and choose Remote System.

3. In the Host Name field, type the access point's IP address and click Connect.

Assigning Basic Settings

After you determine or assign the bridge's IP address, you can browse to the bridge's Express Setup page and perform an initial configuration. Follow these steps.

1. Open your Internet browser. The bridge web-browser interface is fully compatible with these browsers: Microsoft Internet Explorer 6.0 and later and Netscape Navigator 7.0 and later.

2. Enter the bridge's IP address in the browser address line and press Enter. An Enter Network Password windows appears.

3. Press Tab to bypass the Username field and advance to the Password field.

4. Enter the case-sensitive password Cisco and press Enter. The Summary Status page appears. The following illustration shows the Summary Status page.

5. Click Express Setup. The Express Setup page appears. The following illustration shows the Express Setup page.

6. Enter the configuration settings you obtained from your system administrator. The following table lists the configurable settings and their defaults.

Setting
Description and Default

Host Name

A name for the bridge that identifies it on your network.

Default: ap

Configuration Server Protocol

Specifies how the bridge obtains an IP address.

Options: DHCP or Static IP

Default: DHCP

Option
Description

DHCP

IP address is automatically assigned by network's DHCP server.

Static IP

The bridge uses an IP address you enter in the IP Address field.

IP Address

Assigns or changes the bridge's IP address. If DHCP is enabled, leave this field blank.

Default: Depends on Cisco IOS Release in use. See "Important Information" section on page 1 for additional information.

IP Subnet Mask

Identifies the subnet on which your bridge resides. Provided by your network administrator.

If DHCP is enabled, leave this field blank.

Default Gateway

Identifies the address the bridge uses to access another network. Provided by your network administrator. The entry 255.255.255.224 indicates no gateway.

If DHCP is enabled, leave this field blank.

SNMP Community

Identifies the Simple Network Management Protocol (SNMP) used to manage the network on which the bridge resides. Sets protocol attributes. Provided by your network administrator.

Attribute
Description

Read-Only

Bridge allows only SNMP read acesses. User cannot change bridge configuration.

Read-Write

Bridge allows SNMP read and write accesses. User can change bridge configuration.

Role in Radio Network

Determines what function the bridge performs in the wireless network.

Options: Root, Non-Root, Install Mode, Root AP, Workgroup Bridge

Default: Depends on Cisco IOS Release in use. See "Important Information" section on page 1 for additional information.

Root

Bridge connects directly to the main Ethernet LAN and accepts associations from other bridges and clients.

Non-root

Bridge connects to a remote LAN and must associate with a root bridge using the wireless interface.

Install Mode

Activates the bridge install and alignment mode.

Root AP

Bridge emulates a Cisco Aironet 1100 Series Access Point and allows clients to associate to it.

Workgroup Bridge

Bridge emulates a Cisco Aironet 350 Series Workgroup Bridge and allows devices to connect to it through a hub.

Optimize Radio Network for

Optimizes the bridge's radio performance in the wireless network.

Options: Throughput, Range, Default, Custom

Default: Default

Option
Description

Throughput

Maximizes data volume handled by the bridge but might reduce its range.

Range

Maximizes the bridge's range but might reduce throughput.

Default

The bridge retains default radio settings that are designed to provide good range and throughput.

Custom

Bridge uses settings that you enter on the Network Interfaces. Selecting Custom takes you to the Network Interfaces: Settings page.

Aironet Extensions

This setting is always enabled on Cisco Aironet 1300 Series Bridges.



Note If the bridge's IP address changes while you are configuring the bridge using the web-browser interface or a Telnet session over the wired LAN, you lose your connection to the bridge. If you lose your connection, reconnect to the bridge using its new IP address. Follow the steps in the "Resetting the Access Point/Bridge to Default Settings" section if you need to start over.


7. Click Apply to save your settings. If you changed the IP address, you lose your connection to the bridge. Browse to the new IP address to reconnect to the bridge.

Configuring Security Settings

After you assign basic settings to your access point, you must configure security settings to prevent unauthorized access to your network. Because it is a radio device, the access point can communicate beyond the physical boundaries of your work site.

Just as you use the Express Setup page to assign basic settings, you can use the Express Security page to create unique SSIDs and assign one of four security types to them. The following illustration shows the Express Security page.

Understanding Express Security Settings

When the bridge configuration is at factory defaults, the first SSID that you create using the Express security page overwrites the default SSID, which has no security settings. The SSIDs that you create appear in the SSID table at the bottom of the page. You can create up to 16 SSIDs on the bridge.

If you use VLANs on your wireless LAN and assign SSIDs to VLANs, you can create multiple SSIDs using any of the four security settings on the Express Security page. However, if you do not use VLANs on your wireless LAN, the security options that you can assign to SSIDs are limited because on the Express Security page encryption settings and authentication types are linked. Without VLANs, encryption settings (WEP and ciphers) apply to an interface, such as the 2.4-GHz radio, and you cannot use more than one encryption setting on an interface. For example, when you create an SSID with static WEP with VLANs disabled, you cannot create additional SSIDs with WPA authentication because they use different encryption settings. If you find that the security setting for an SSID conflicts with another SSID, you can delete one or more SSIDs to eliminate the conflict.

The following table briefly describes the four security settings you can assign to an SSID using the Express Security page.

Security Type
Description

No Security

The least secure option. Use this option only for SSIDs used in a public space and assign it to a VLAN that restricts access to your network.

Static WEP Key

More secure than no security. However, static WEP keys are vulnerable to attack.

EAP Authentication

Enables 802.1x authentication. Requires an IP address and shared secret for an authentication server on your network (server authentication port 1645). You do not need to enter a WEP key.

WPA

Wi-Fi Protected Access (WPA) permits wireless access to users authenticated against a database through the services of an authentication server, then encrypts their IP traffic with stronger algorithms than those used in WEP. As with EAP authentication, you must enter the IP address and shared secret for an authentication server on your network (server authentication port 1645).



Note For more information about settings on the Express Security page, see Chapter 2 of the Cisco Aironet 1300 Series Wireless Bridge Software Configuration Guide.


Express Security Limitations

Because the Express Security page is designed for simple configuration of basic security, the options available are a subset of the bridge's security capabilities. Keep these limitations in mind when using the Express Security page:

You cannot edit SSIDs. However, you can delete SSIDs and re-create them.

You cannot assign SSIDs to specific radio interfaces. The SSIDs that you create are enabled on all radio interfaces. To assign SSIDs to specific radio interfaces, use the Security SSID Manager page.

You cannot configure multiple authentication servers. To configure multiple authentication servers, use the Security Server Manager page.

You cannot configure multiple WEP keys. To configure multiple WEP keys, use the Security Encryption Manager page.

You cannot assign an SSID to a VLAN that is already configured on the bridge. To assign an SSID to an existing VLAN, use the Security SSID Manager page.

You cannot configure combinations of authentication types on the same SSID (such as MAC address authentication and EAP authentication). To configure combinations of authentication types, use the Security SSID Manager page.

Configuring Advanced Parameters

Your bridge is now running but probably requires additional configuring to conform to your network's operational and security requirements. Refer to the Cisco Aironet 1300 Series Outdoor Access Point/Bridge Software Configuration Guide for detailed information and instructions. The following table lists the chapters you need to consult.

For information on
Go to

Using the command line interface

Chapter 4

Configuring radio settings

Chapter 6

Configuring SSIDs (including multiple SSIDs)

Chapter 7

Configuring Spanning Tree Protocol

Chapter 8

Configuring WEP and WEP features (TKIP, MIC)

Chapter 9

Configuring authentication types (LEAP)

Chapter 10

Configuring WDS, Fast Secure Roaming and Radio Management

Chapter 11

Configuring RADIUS and TACACS servers

Chapter 12

Configuring VLANs

Chapter 13

Configuring QoS

Chapter 14

Configuring filters

Chapter 15

Configuring CDP

Chapter 16

Configuring SNMP

Chapter 17

Configuring the bridge as an access point

Chapter 20

Configuring the bridge as a workgroup bridge

Chapter 20


Cisco One-Year Limited Hardware Warranty Terms

There are special terms applicable to your hardware warranty and various services that you can use during the warranty period. Your formal Warranty Statement, including the warranties and license agreements applicable to Cisco software, is available on Cisco.com. Follow these steps to access and download the Cisco Information Packet and your warranty and license agreements from Cisco.com.

1. Launch your browser, and go to this URL:

http://www.cisco.com/en/US/products/prod_warranties_listing.html

The Warranties and License Agreements page appears.

2. To read the Cisco Information Packet, follow these steps:

a. Click the Information Packet Number field, and make sure that the part number 78-5235-03A0 is highlighted.

b. Select the language in which you would like to read the document.

c. Click Go.

The Cisco Limited Warranty and Software License page from the Information Packet appears.

d. Read the document online, or click the PDF icon to download and print the document in Adobe Portable Document Format (PDF).


Note You must have Adobe Acrobat Reader to view and print PDF files. You can download the reader from Adobe's website: http://www.adobe.com.


3. To read translated and localized warranty information about your product, follow these steps:

a. Enter this part number in the Warranty Document Number field:

78-10747-01C0

b. Select the language in which you would like to view the document.

c. Click Go.

The Cisco warranty page appears.

d. Read the document online, or click the PDF icon to download and print the document in Adobe Portable Document Format (PDF).

You can also contact the Cisco service and support website for assistance:

http://www.cisco.com/cisco/web/support/index.html

Duration of Hardware Warranty

One (1) Year

Replacement, Repair, or Refund Policy for Hardware

Cisco or its service center will use commercially reasonable efforts to ship a replacement part within ten (10) working days after receipt of a Return Materials Authorization (RMA) request. Actual delivery times can vary, depending on the customer location.

Cisco reserves the right to refund the purchase price as its exclusive warranty remedy.

To Receive a Return Materials Authorization (RMA) Number

Contact the company from whom you purchased the product. If you purchased the product directly from Cisco, contact your Cisco Sales and Service Representative.

Complete the information below, and keep it for reference.

Company product purchased from

 

Company telephone number

 

Product model number

 

Product serial number

 

Maintenance contract number