Download aironet autonomous ios






















Ensure that the access point has a route to the TFTP server. The access point and the TFTP server must be in the same subnetwork if you do not have a router to route traffic between subnets. Check connectivity to the TFTP server by using the ping command. Ensure that the configuration file to be downloaded is in the correct directory on the TFTP server. For download operations, ensure that the permissions on the file are set correctly.

The permission on the file should be world-read. During upload operations, if you are overwriting an existing file on the server, ensure that the permissions on the file are set correctly. Permissions on the file should be world-write. Configure using tokyo-confg from Booting tokyo-confg from Write file tokyo-confg on host When you copy a configuration file from the access point to a server by using FTP, the Cisco IOS software sends the first valid username in this list: The username specified in the copy command if a username is specified.

The username set by the ip ftp username username global configuration command if the command is configured. The access point sends the first valid password in this list: The password specified in the copy command if a password is specified. The password set by the ip ftp password password global configuration command if the command is configured.

The access point forms a password named username apname. The variable username is the username associated with the current session, apname is the configured host name, and domain is the domain of the access point. The access point and the FTP server must be in the same subnetwork if you do not have a router to route traffic between subnets. Check connectivity to the FTP server by using the ping command. If you are accessing the access point through a Telnet session and you do not have a valid username, make sure that the current FTP username is the one that you want to use for the FTP download.

You can enter the show users privileged EXEC command to view the valid username. If you do not want to use this username, create a new FTP username by using the ip ftp username username global configuration command during all copy operations. If you are accessing the access point through a Telnet session and you have a valid username, this username is used, and you do not need to set the FTP username.

Include the username in the copy command if you want to specify a username for only that copy operation. When you upload a configuration file to the FTP server, it must be properly configured to accept the write request from the user on the access point. Configure using host1-confg from Loading byte file host1-confg:!

Address of remote host [ Name of configuration file[rtr2-confg]? Configure using host2-confg from Loading byte file host2-confg:! Write file ap2-confg on host Remote host[]? Name of configuration file to write [ap2-confg]?

When you copy a configuration file from the access point to a server, the Cisco IOS software sends the first valid username in this list: The username specified in the copy command if a username is specified. The username set by the ip rcmd remote-username username global configuration command if the command is configured.

The remote username associated with the current TTY terminal process. For example, if the user is connected to the router through Telnet and was authenticated through the username command, the access point software sends the Telnet username as the remote username.

The access point host name. Ensure that the access point has a route to the RCP server. The access point and the server must be in the same subnetwork if you do not have a router to route traffic between subnets. Check connectivity to the RCP server by using the ping command. If you are accessing the access point through a Telnet session and you do not have a valid username, make sure that the current RCP username is the one that you want to use for the RCP download.

If you do not want to use this username, create a new RCP username by using the ip rcmd remote-username username global configuration command to be used during all copy operations. If you are accessing the access point through a Telnet session and you have a valid username, this username is used, and you do not need to set the RCP username.

When you upload a file to the RCP server, it must be properly configured to accept the RCP write request from the user on the access point. For UNIX systems, you must add an entry to the. For example, suppose that the access point contains these configuration lines: hostname ap1. Write file ap-confg on host Clearing Configuration Information This section describes how to clear configuration information.

Deleting a Stored Configuration File. Caution You cannot restore a file after it has been deleted. Working with Software Images This section describes how to archive download and upload software image files, which contain the system software, Cisco IOS software, radio firmware, and the web management HTML files. Ensure that the image to be downloaded is in the correct directory on the TFTP server. Caution For the download and upload algorithms to operate properly, do not rename image directories.

When you copy an image file from the access point to a server by using FTP, the Cisco IOS software sends the first valid username in this list: The username specified in the archive download-sw or archive upload-sw privileged EXEC command if a username is specified. The access point sends the first valid password in this list: The password specified in the archive download-sw or archive upload-sw privileged EXEC command if a password is specified.

The variable username is the username associated with the current session, ap name is the configured host name, and domain is the domain of the access point. Before you begin downloading or uploading an image file by using FTP, perform these tasks: Ensure that the access point has a route to the FTP server.

Verify connectivity to the FTP server by using the ping command. If you do not want to use this username, create a new FTP username by using the ip ftp username username global configuration command. This new name will be used during all archive operations. Include the username in the archive download-sw or archive upload-sw privileged EXEC command if you want to specify a username for that operation only.

When you upload an image file to the FTP server, it must be properly configured to accept the write request from the user on the access point. When you copy an image from the access point to a server by using RCP, the Cisco IOS software sends the first valid username in this list: The username specified in the archive download-sw or archive upload-sw privileged EXEC command if a username is specified.

The username set by the ip rcmd remote-username username global configuration command if the command is entered. Before you begin downloading or uploading an image file by using RCP, do these tasks: Ensure that the workstation acting as the RCP server supports the remote shell rsh. If you do not want to use this username, create a new RCP username by using the ip rcmd remote-username username global configuration command to be used during all archive operations.

Once the new image is downloaded, the access point automatically reloads. At this time, the connection to the access point is lost. Login to the AP again. If you use the CLI, you can check this with the show version command. Make sure that the TFTP server is reachable from the access point.

Disable any firewall to see if it blocks the TFTP port udp MarkPayton This person is a verified professional. Verify your account to enable IT peers to see that you are a professional. Thai Pepper. TaylorC This person is a verified professional. JKZfixme This person is a verified professional. Cisco expert. This topic has been locked by an administrator and is no longer open for commenting. Read these next Step 1 Open your Internet browser.

An Enter Network Password screen appears. Step 3 Enter your username in the Username field. Step 4 Enter the wireless device password in the Password field and press Enter. The Summary Status page appears. Step 5 Click Software and the System Software screen appears. Step 8 Click Restart. The system reboots. Step 9 After the wireless device reboots, you must reconfigure the wireless device by using the Web-browser interface or the CLI.

Follow the steps below to delete the current configuration and return all wireless device settings to the factory defaults using the CLI. Step 2 Reboot the wireless device by removing power and reapplying power. Step 3 Let the wireless device boot until the command prompt appears and the wireless device begins to inflate the image. When you see these lines on the CLI, press Esc:. Step 5 Use the dir flash: command to display the contents of Flash and find the config.

Step 6 Use the rename command to change the name of the config. Step 7 Use the reset command to reboot the wireless device. Step 8 When the access point has finished rebooting the software, establish a new Telnet session to the access point.

If the wireless device has a firmware failure, you must reload the image file using the Web browser interface or on all access points, by pressing and holding the MODE button for around 30 seconds. You can use the browser interface if the wireless device firmware is still fully operational and you want to upgrade the firmware image. However, you can use the MODE button when the access point has a corrupt firmware image. If the wireless device experiences a firmware failure or a corrupt firmware image, indicated by three red LED indicators, you must reload the image from a connected TFTP server.

Note This process resets all configuration settings to factory defaults, including passwords, security configurations, the wireless device IP address, and SSIDs. Follow these steps to reload the access point image file:. Step 2 Make sure that the PC contains the access point image file such as such as ap3g2-k9w7-tar. For example, if the image file is ap3g2-k9w7-tar. Step 5 Disconnect power the power jack for external power or the Ethernet cable for in-line power from the access point.

Step 9 After the access point reboots, you must reconfigure the access point by using the Web-browser interface or the CLI. You can also use the Web browser interface to reload the wireless device image file. Note Your wireless device configuration does not change when you use the browser to reload the image file. The HTTP interface enables you to browse to the wireless device image file on your PC and download the image to the wireless device.

Follow the instructions below to use the HTTP interface:. Example: No Security for Radio 2. Example: EAP Authentication. Example: WPA2 for Radio 2. Depending on your power source, you might need to enter the power source type in the access point configuration.

If you use the AC power adapter to provide power access point, you do not need to adjust the access point configuration. If you use a switch to provide Power over Ethernet PoE to the , , , , , and access point, and the switch supports the IEEE If you use a power injector to provide power to the , , , , , or access point, select Power Injector on the System Software: System Configuration page and enter the MAC address of the switch port to which the access point is connected.

When enabled, the dot11 extension power native shifts the power tables the radio uses from the IEEE The Native Power tables were designed specifically to configure powers as low as -1dBm for Cisco Aironet radios that support these levels.

The Cisco Aironet Series access points requires 20W of power for optimum performance of This allows you to configure one radio to operate using This allows full functionality under Once you upgrade to a powering solution that provides 20W of power to the access point, you can configure the second radio so that both radios are fully functional with 2x3 multiple input multiple output MIMO technology.

Certain radio configurations may require more power than can be provided by the inline power source. When insufficient inline power is available, you can select several options based upon your access point radio configuration as shown in Table Maximum transmit power will vary by channel and according to individual country regulations. Refer to the product documentation for specific details.

It is designed to provide high throughput and operate in the 5 GHz band. The Shutting down the However the channel widths can be independently configured with the restriction that it should be above the channel width configured on Please see Table for more details on the supported channel width combinations.

Table Supported Channel Width Combinations. Off channel scanning or transmissions are not supported. The , , and Please refer to the below table. Tip Radio configurations such as 4x imply 4 transmitters and 4 receivers capable of 3 spatial streams.

If the AP is running on reduced power, under Home:Summary Status, the following warning is displayed:. Due to insufficient inline power. Upgrade inline power source or install power injector. All access points except outdoor mesh products can be powered over Ethernet. Access points with two radios powered over Ethernet are fully functional and support all the features. See Table for the various power management options available.

This is the power required at the PSE, which is either a switch or an injector. You cannot configure power levels independently for When you connect the wireless device to the wired LAN, the wireless device links to the network using a bridge virtual interface BVI that it creates automatically.

Note If you are connected to the wireless device using a Telnet session, you lose your connection to the wireless device when you assign a new IP address to the BVI. If you need to continue configuring the wireless device using Telnet, use the new IP address to open another Telnet session to the wireless device.

Follow these steps to access the CLI by using a Telnet session. Check your PC operating instructions for detailed instructions for your operating system. Note In Windows , the Telnet window does not contain drop-down lists. To start the Telnet session in Windows , type open followed by the wireless device IP address.

First, access points can be placed in public places, inviting the possibility that they could be unplugged and their network connection used by an outsider. Second, when a repeater access point is incorporated into a wireless network, the repeater access point must authenticate to the root access point in the same way as a client does. You can complete the phases in any order, but they must be completed before the supplicant becomes operational. Beginning in privileged EXEC mode, follow these steps to create an Creates a dot1x credentials profile and enters the dot1x credentials configuration submode.

Optional —Enter the anonymous identity to be used. Optional —Enter a description for the credentials profile. Enter an unencrypted password for the credentials. Hidden passwords are used when applying a previously saved configuration.

Note Unencrypted and clear text are the same. You can enter a 0 followed by the clear text password, or omit the 0 and enter the clear text password.

Optional Save your entries in the configuration file. Use the no form of the dot1x credentials command to negate a parameter. The following example creates a credentials profile named test with the username Cisco and a the unencrypted password Cisco:. Credential profiles are applied to an interface or an SSID in the same way. Beginning in the privileged EXEC mode, follow these steps to apply the credentials to the access point wired port:. Enter the interface configuration mode for the access point Gigabit Ethernet port.

Note You can also use interface fa0 to enter the Gigabit Ethernet configuration mode. Enter the name of a previously created credentials profile. The following example applies the credentials profile test to the access point gigabit Ethernet port:. If you have a repeater access point in your wireless network and are using the



0コメント

  • 1000 / 1000