<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: basic authentication o A.P in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303117#M140721</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi that for the reply.I knew somebody will post it this attached file.I tested it many many time on my AIR-AP1120-B-A-K9 and it just could'nt work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Jun 2004 00:19:23 GMT</pubDate>
    <dc:creator>ddicky</dc:creator>
    <dc:date>2004-06-02T00:19:23Z</dc:date>
    <item>
      <title>basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303115#M140719</link>
      <description>&lt;P&gt;I have a simple wireless LAN,no ACS involved.&lt;/P&gt;&lt;P&gt;I will like to do simple user authentication on all the wireless users which would like to associate with the A.P,can it be done as I understand the LEAP will able to make the A.P as the local authenticator.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 16:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303115#M140719</guid>
      <dc:creator>ddicky</dc:creator>
      <dc:date>2021-07-04T16:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303116#M140720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a URL that shows the 1100 being setup as a local radius server for LEAP. &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801c0912.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801c0912.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2004 11:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303116#M140720</guid>
      <dc:creator>kmarrero</dc:creator>
      <dc:date>2004-06-01T11:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303117#M140721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi that for the reply.I knew somebody will post it this attached file.I tested it many many time on my AIR-AP1120-B-A-K9 and it just could'nt work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2004 00:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303117#M140721</guid>
      <dc:creator>ddicky</dc:creator>
      <dc:date>2004-06-02T00:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303118#M140722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It took us a very long time to get the various useful authentication features going, and the documentation is most unhelpful. Two things we found:&lt;/P&gt;&lt;P&gt;Use a shared secret less than 16 characters.&lt;/P&gt;&lt;P&gt;Use key number 2, not key number one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still stuck I can post the configurations of a working master/slave pair, but you'd have to disentangle the CCKM, ACS server &amp;amp; WDS which we also use.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jun 2004 21:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303118#M140722</guid>
      <dc:creator>ablenner</dc:creator>
      <dc:date>2004-06-02T21:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303119#M140723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thks god there is somebody which having the same problem with doc.Your posting configuration will be very much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2004 10:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303119#M140723</guid>
      <dc:creator>ddicky</dc:creator>
      <dc:date>2004-06-03T10:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: basic authentication o A.P</title>
      <link>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303120#M140724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here goes: 192.168.104.245 is the ACS server; you should be able to leave it there initially - local RADIUS will cope without it. 192.168.1.100 is the AP RADIUS master; 192.168.1.105 is the AP slave.&lt;/P&gt;&lt;P&gt;Our configs use WLSE and WDS, so the accounts for them are included in the RADIUS master - you should be able to remove them gently as you remove the associated features, but the RADIUS SHOULD work, even with the rest of the crap you don't want still there. Good luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jun 2004 03:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/basic-authentication-o-a-p/m-p/303120#M140724</guid>
      <dc:creator>ablenner</dc:creator>
      <dc:date>2004-06-07T03:30:07Z</dc:date>
    </item>
  </channel>
</rss>

