4-12
Cisco 880 Series Integrated Services Router Software Configuration Guide
OL-22206-01
Chapter 4 Basic Wireless Device Configuration
Related Documentation
Recovering Software on the Access Point
To recover the image on the access point, use the
service-module wlan-ap0 reset bootloader
command
in global configuration mode. This command returns the access point to the bootloader for manual image
recovery.
Caution
Use this command with caution. It does
not
provide an orderly shutdown and consequently
may impact file operations that are in progress. Use this command only to recover from a
shutdown or a failed state.
Related Documentation
Refer to the following documentation for additional autonomous and unified configuration procedures:
•
Autonomous Cisco Documentation
—
Table 4-2
•
Cisco Unified Documentation
—
Table 4-3
Table 4-2
Autonomous Cisco Documentation
Network Design
Links
Wireless Overview
Chapter 2, “Wireless Device Overview”
Security
Links
Authentication Types for Wireless Devices
This document describes the authentication types that are configured on the
access point.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityAuthenticationTypes.html
RADIUS and Servers in a
Wireless Environment
This document describes how to enable and configure the RADIUS and
and provides detailed accounting information and flexible
administrative control over authentication and authorization processes.
RADIUS and are facilitated through AAA
1
and can be enabled
only through AAA commands.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityRadiusTacacs_1.html
Using the Access Point as a Local
Authenticator
This document describes how to use a wireless device in the role of an access
point as a local authenticator, serving as a standalone authenticator for a small
wireless LAN, or providing backup authentication service. As a local
authenticator, the access point performs LEAP, EAP-FAST, and MAC-based
authentication for up to 50 client devices.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityLocalAuthent.html
Cipher Suites and WEP
This document describes how to configure the cipher suites required for using
WPA and CCKM
2
; WEP; and WEP features including AES
3
, MIC
4
, TKIP,
and broadcast key rotation.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityCipherSuitesWEP.html