Cisco Aironet 1300

-(Xyphox)-

Supreme [H]ardness
Joined
Sep 9, 2004
Messages
6,518
Has anyone ever worked with one of these?
Having some issues configuring 2 of them
 
Well i have one on the outside of our Plant 3 building, and the other on the Converance House, both are configured the same, i do a link test it is great, but i can not get traffic to the house. I have the one on our building wired into our network into a cisco switch. I guess is there something i am missing, or what to be looking for so i can get them to talk right and pass the internet and network traffic over. i have them setup with static ip's for our network 10.13.0.100 and 10.13.0.101 with mask's and same default gateways. I have dns setup in both. The one at .100 i can ping and access threw the network just fine, but the one at the house i can not ping or see at all unless i am on site locally with a laptop pluged into it. Now the one on the plant is hooked into our DHCP server, is there anything i have to do so that i can just plug the one on the house into a switch and give out ip's for our network and such.
 
So, you are trying to pass traffic between AP's? Do you have them set up as a bridge?
 
Yes, One as root, other as non-root
I am using wep 128
i was not sure on the other secuirty, which should i be using?
 
is this all under 1 subnet? it seems like each site has its own subnet. if i remember correctly, routers will not allow traffic to be passed through from another router unless configured. but it has been 3 years since i've touched a cisco router (cisco classes)
 
yes, they are on the same subnet
everything is on the 10.13.x.x\
with a 255.255.0.0
 
I just erarsed the one in the house and reprogramed it, i can see the other one and its assocating, but i still can not ping the other like before...
:confused: :confused:
 
Seeing i have the one hooked to a dhcp server, i do not have to mess with DHCP on the bridges correct, i know i read something about them becomng a mini dhcp server but it is already connected to one, but with static ip's for both bridges...
Grr... why wont it work :confused: :(
 
My preference on things like this, get it working with both AP's in the same room, then set them on location.

Its a pain to get bridge working after you get them physically seperated, unless its second nature with the hardware used.
 
0ldman said:
My preference on things like this, get it working with both AP's in the same room, then set them on location.

Its a pain to get bridge working after you get them physically seperated, unless its second nature with the hardware used.
One of the features of the Aironet AP running in bridge mode is to tune the antennas for a certian distance in order to optimize throughput. That really has to be done after they have been installed. But, most of it can be configured beforehand.
 
0ldman said:
My preference on things like this, get it working with both AP's in the same room, then set them on location.

Its a pain to get bridge working after you get them physically seperated, unless its second nature with the hardware used.

Problem with this is they are already mounted to each building with all the cables ran and set in place.
 
Ok, Here are the Config files, first is the root, than non-root

Root-Config
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Plant3
!
enable secret 5 $1$1GsO$CbOkE.d6SWbReIqjni0hW0
!
username Cisco privilege 15 password 7 112A1016141D
clock timezone GMT -5
clock summer-time R recurring
ip subnet-zero
ip domain name oetiker.dns
ip name-server 10.13.1.10
ip name-server 10.13.1.11
!
!
aaa new-model
!
!
aaa group server radius rad_eap
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
aaa session-id common
!
dot11 ssid Remote
authentication open
authentication key-management wpa
infrastructure-ssid
wpa-psk ascii 7 0256574F5A2D2A136E6B2B4A2647
!
dot11 network-map
!
!
!
bridge irb
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption mode ciphers aes-ccm
!
ssid Remote
!
short-slot-time
cca 75
concatenation
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
station-role root
infrastructure-client
bridge-group 1
!
interface FastEthernet0
ip address 10.13.0.100 255.255.0.0
no ip route-cache
bridge-group 1
!
interface BVI1
ip address 10.13.0.100 255.255.0.0
no ip route-cache
!
ip default-gateway 10.13.0.1
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
logging snmp-trap emergencies
logging snmp-trap alerts
logging snmp-trap critical
logging snmp-trap errors
logging snmp-trap warnings
snmp-server community defaultCommunity RW
snmp-server enable traps tty
radius-server local
nas 10.13.0.100 key 7 11594A1146392E3E260F09770B63
!
radius-server attribute 32 include-in-access-req format %h
radius-server vsa send accounting
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
!
!
wlccp ap username Cisco password 7 14341B180F0B
!
line con 0
transport preferred all
transport output all
line vty 0 4
transport preferred all
transport input all
transport output all
line vty 5 15
transport preferred all
transport input all
transport output all
!
sntp broadcast client
end


Non-Root Config
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Remote
!
enable secret 5 $1$1EB8$6u58MMipeg0NGiltgDTRi1
!
username Cisco password 7 112A1016141D
clock timezone GMT -5
clock summer-time R recurring
ip subnet-zero
ip domain name oetiker,dns
ip name-server 10.13.1.10
ip name-server 10.13.1.11
!
!
aaa new-model
!
!
aaa group server radius rad_eap
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
aaa session-id common
!
dot11 ssid Remote
authentication open
authentication key-management wpa
infrastructure-ssid
wpa-psk ascii 7 091C1D1D482E3220292926790874
!
dot11 network-map
!
!
!
bridge irb
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption mode ciphers aes-ccm
!
ssid Remote
!
short-slot-time
cca 75
concatenation
parent 1 0014.6ac5.8b00
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
station-role non-root
infrastructure-client
bridge-group 1
bridge-group 1 spanning-disabled
!
interface FastEthernet0
ip address 10.13.0.101 255.255.0.0
no ip route-cache
bridge-group 1
bridge-group 1 spanning-disabled
!
interface BVI1
ip address 10.13.0.101 255.255.0.0
no ip route-cache
!
ip default-gateway 10.13.0.1
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
logging snmp-trap emergencies
logging snmp-trap alerts
logging snmp-trap critical
logging snmp-trap errors
logging snmp-trap warnings
snmp-server view dot11view ieee802dot11 included
snmp-server community public view dot11view RO
snmp-server enable traps tty
radius-server local
nas 10.13.0.101 key 7 0354081F5724047E6C2C3B563442
!
radius-server attribute 32 include-in-access-req format %h
radius-server vsa send accounting
!
control-plane
!
bridge 1 route ip
!
!
!
line con 0
transport preferred all
transport output all
line vty 0 4
transport preferred all
transport input all
transport output all
line vty 5 15
transport preferred all
transport input all
transport output all
!
sntp broadcast client
end
 
If I recall, in order to bridge successfully, the WEP key must be the same on both routers (it looks like it's different in those configs).

Chris
 
NetherChris said:
If I recall, in order to bridge successfully, the WEP key must be the same on both routers (it looks like it's different in those configs).

Chris

It is, not sure why its show like that, i double checked it this moring
 
you know after all that work i reset the root ap and boom they work...
gotta love it :p
 
Back
Top