Cisco Systems CISCO881SECK9 Router User Manual


 
4-12
Cisco 880 Series Integrated Services Router Software Configuration Guide
OL-22206-01
Chapter 4 Basic Wireless Device Configuration
Related Documentation
Recovering Software on the Access Point
To recover the image on the access point, use the service-module wlan-ap0 reset bootloader command
in global configuration mode. This command returns the access point to the bootloader for manual image
recovery.
Caution Use this command with caution. It does not provide an orderly shutdown and consequently
may impact file operations that are in progress. Use this command only to recover from a
shutdown or a failed state.
Related Documentation
Refer to the following documentation for additional autonomous and unified configuration procedures:
Autonomous Cisco DocumentationTable 4-2
Cisco Unified DocumentationTable 4-3
Table 4-2 Autonomous Cisco Documentation
Network Design Links
Wireless Overview Chapter 2, “Wireless Device Overview”
Security Links
Authentication Types for Wireless Devices This document describes the authentication types that are configured on the
access point.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityAuthenticationTypes.html
RADIUS and TACACS+ Servers in a
Wireless Environment
This document describes how to enable and configure the RADIUS and
TACACS+ and provides detailed accounting information and flexible
administrative control over authentication and authorization processes.
RADIUS and TACACS+ are facilitated through AAA
1
and can be enabled
only through AAA commands.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityRadiusTacacs_1.html
Using the Access Point as a Local
Authenticator
This document describes how to use a wireless device in the role of an access
point as a local authenticator, serving as a standalone authenticator for a small
wireless LAN, or providing backup authentication service. As a local
authenticator, the access point performs LEAP, EAP-FAST, and MAC-based
authentication for up to 50 client devices.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityLocalAuthent.html
Cipher Suites and WEP This document describes how to configure the cipher suites required for using
WPA and CCKM
2
; WEP; and WEP features including AES
3
, MIC
4
, TKIP,
and broadcast key rotation.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityCipherSuitesWEP.html