<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 1242 Upgrade to support WPA2 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-1242-upgrade-to-support-wpa2/m-p/3036018#M144464</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;i've got a bunch of 1242 (SKU: &lt;SPAN style="color: #000000;"&gt;cisco AIR-AP1242AG-A-K9&lt;/SPAN&gt;) standalone APs and would like to re-use for a client that requires WPA2 for their security requirement.&lt;/P&gt;
&lt;P&gt;it currently doesn't support WPA version 2 although it supports AES CCM.&lt;/P&gt;
&lt;P&gt;i did some searching and was pointed to use &lt;STRONG&gt;12.3.8JEC&lt;/STRONG&gt;. my question is would the IOS &lt;STRONG&gt;c1200-k9w7-tar.123-8.JEC3.tar&lt;/STRONG&gt; will work or is it compatible with my 1242 AP?&lt;/P&gt;
&lt;P&gt;the 12.3.8.JEC notes only specified to work on a 1232AG. was wondering if someone tried on the said AP and if it worked before i suggest buying new AP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="wp364897table364895" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" width="80%"&gt;&lt;CAPTION&gt;
&lt;P class="pTC_TableCap"&gt;Table&amp;nbsp;1 Software Installation Guide&lt;/P&gt;
&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp364901" target="_blank"&gt;&lt;/A&gt;
&lt;DIV class="pCH1_CellHead1"&gt;If your Cisco Access Point SKU is&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364903" target="_blank"&gt;&lt;/A&gt;
&lt;DIV class="pCH1_CellHead1"&gt;Install this Cisco IOS Release&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp364905" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1232AG (&lt;SPAN style="color: #ff0000;"&gt;AIR-AP1232AG-E-K9&lt;/SPAN&gt;)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364907" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.3(8)JEC3&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp365012" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1121AG (AIR-AP1121AG-E-K9)&lt;/P&gt;
&lt;A name="wp365014" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1131AG (AIR-AP1131AG-E-K9)&lt;/P&gt;
&lt;A name="wp365188" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1242AG (AIR-AP1242AG-E-K9)&lt;/P&gt;
&lt;A name="wp365015" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1252AG (AIR-AP1252AG-E-K9)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364950" target="_blank"&gt;&lt;/A&gt;&lt;A name="wp365147" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.4(10b)JDA3&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp365789" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Integrated Services Routers (CISCO892W-AGN-E-K9)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp365791" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.4(10b)JDA3&lt;/P&gt;
&lt;A name="wp365860" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;(The router software image name is &lt;EM class="cEmphasis"&gt;ap801-k9w7-tar&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-4_10b_JA/command/reference/cr2410b/cr12410b-chap2.html#wpxref75622" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-4_10b_JA/command/reference/cr2410b/cr12410b-chap2.html#wpxref75622&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H2 class="pCRC_CmdRefCommand"&gt;authentication key-management&lt;/H2&gt;
&lt;P&gt;&lt;A name="wp2495228" target="_blank"&gt;&lt;/A&gt; &lt;A name="wpmkr2496291" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Use the &lt;B style="font-weight: bold;" class="cBold"&gt;authentication key-management &lt;/B&gt;&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;SSID&lt;/SPAN&gt;&lt;B class="cBold"&gt; &lt;/B&gt;configuration mode command to configure the radio interface (for the specified SSID) to support authenticated key management. Cisco Centralized Key Management (CCKM) and Wi-Fi Protected Access (WPA) are the key management types supported on the access point.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp2496305" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pCE_CmdEnv"&gt;authentication key-management &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;{[&lt;/SPAN&gt;wpa version&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;]&lt;/SPAN&gt; &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;[&lt;/SPAN&gt;cckm&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;]} [&lt;/SPAN&gt;optional&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;] &lt;/SPAN&gt;&lt;/P&gt;
&lt;SECTION class="Note1B"&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/note.gif" alt="" /&gt;&lt;/SECTION&gt;
&lt;HR class="Cautn1table" /&gt;
&lt;P&gt;&lt;A name="wp2496306" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pN1_Note1"&gt;&lt;B&gt;Note &lt;/B&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="1" /&gt;This command is not supported on bridges.&lt;/P&gt;
&lt;HR class="Cautn1table" /&gt;
&lt;P&gt;&lt;A name="wp2496343" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H3 class="pCRSD_CmdRefSynDesc"&gt;Syntax Description&lt;/H3&gt;
&lt;SECTION align="left"&gt;
&lt;TABLE id="wp2496340table2496334" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" width="80%"&gt;&lt;CAPTION&gt;&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2496340" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;wpa version {1 &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;|&lt;/SPAN&gt; 2}&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2496342" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies WPA MFP version authenticated key management for the SSID&lt;/P&gt;
&lt;A name="wp3580240" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="19" /&gt;Version 1—WPAv1handshake for TKIP encryption&lt;/P&gt;
&lt;A name="wp3580289" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="19" /&gt;&lt;SPAN style="color: #ff0000;"&gt;Version 2—WPAv2 handshake for AES-CCMP encryption&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2574122" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;cckm&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2574124" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies CCKM authenticated key management for the SSID&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2497517" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;optional&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2497519" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies that client devices that do not support authenticated key management can use the SSID&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/SECTION&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242#sh ve&lt;BR /&gt;Cisco IOS Software, C1240 Software (C1240-K9W7-M), Version 12.3(7)JA1, RELEASE SOFTWARE (fc1)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2005 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Thu 06-Oct-05 09:45 by evmiller&lt;BR /&gt;&lt;BR /&gt;ROM: Bootstrap program is C1240 boot loader&lt;BR /&gt;BOOTLDR: C1240 Boot Loader (C1240-BOOT-M) Version 12.3(7)JA1, RELEASE SOFTWARE (fc1)&lt;BR /&gt;&lt;BR /&gt;1242 uptime is 4 weeks, 2 days, 19 hours, 14 minutes&lt;BR /&gt;System returned to ROM by power-on&lt;BR /&gt;System image file is "flash:/&lt;SPAN style="color: #ff0000;"&gt;c1240-k9w7-mx.123-7.JA1/c1240-k9w7-mx.123-7.JA1"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242(config)#interface Dot11Radio0&lt;BR /&gt;1242(config-if)#encryption vlan 1 mode ciphers ?&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; aes-ccm&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA AES CCMP&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; ckip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco Per packet key hashing&lt;BR /&gt;&amp;nbsp; ckip-cmic&amp;nbsp; Cisco Per packet key hashing and MIC (MMH)&lt;BR /&gt;&amp;nbsp; cmic&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco MIC (MMH)&lt;BR /&gt;&amp;nbsp; tkip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA Temporal Key encryption&lt;BR /&gt;&amp;nbsp; wep128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 128 bit key&lt;BR /&gt;&amp;nbsp; wep40&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 bit key&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242(config-ssid)#authentication key-management wpa ?&lt;BR /&gt;&amp;nbsp; cckm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow CCKM clients&lt;BR /&gt;&amp;nbsp; optional&amp;nbsp; allow legacy clients&lt;BR /&gt;&amp;nbsp; &amp;lt;cr&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 14:11:00 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2021-07-05T14:11:00Z</dc:date>
    <item>
      <title>Cisco 1242 Upgrade to support WPA2</title>
      <link>https://community.cisco.com/t5/wireless/cisco-1242-upgrade-to-support-wpa2/m-p/3036018#M144464</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;i've got a bunch of 1242 (SKU: &lt;SPAN style="color: #000000;"&gt;cisco AIR-AP1242AG-A-K9&lt;/SPAN&gt;) standalone APs and would like to re-use for a client that requires WPA2 for their security requirement.&lt;/P&gt;
&lt;P&gt;it currently doesn't support WPA version 2 although it supports AES CCM.&lt;/P&gt;
&lt;P&gt;i did some searching and was pointed to use &lt;STRONG&gt;12.3.8JEC&lt;/STRONG&gt;. my question is would the IOS &lt;STRONG&gt;c1200-k9w7-tar.123-8.JEC3.tar&lt;/STRONG&gt; will work or is it compatible with my 1242 AP?&lt;/P&gt;
&lt;P&gt;the 12.3.8.JEC notes only specified to work on a 1232AG. was wondering if someone tried on the said AP and if it worked before i suggest buying new AP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="wp364897table364895" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" width="80%"&gt;&lt;CAPTION&gt;
&lt;P class="pTC_TableCap"&gt;Table&amp;nbsp;1 Software Installation Guide&lt;/P&gt;
&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp364901" target="_blank"&gt;&lt;/A&gt;
&lt;DIV class="pCH1_CellHead1"&gt;If your Cisco Access Point SKU is&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364903" target="_blank"&gt;&lt;/A&gt;
&lt;DIV class="pCH1_CellHead1"&gt;Install this Cisco IOS Release&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp364905" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1232AG (&lt;SPAN style="color: #ff0000;"&gt;AIR-AP1232AG-E-K9&lt;/SPAN&gt;)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364907" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.3(8)JEC3&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp365012" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1121AG (AIR-AP1121AG-E-K9)&lt;/P&gt;
&lt;A name="wp365014" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1131AG (AIR-AP1131AG-E-K9)&lt;/P&gt;
&lt;A name="wp365188" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1242AG (AIR-AP1242AG-E-K9)&lt;/P&gt;
&lt;A name="wp365015" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Aironet 1252AG (AIR-AP1252AG-E-K9)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp364950" target="_blank"&gt;&lt;/A&gt;&lt;A name="wp365147" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.4(10b)JDA3&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp365789" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Cisco Integrated Services Routers (CISCO892W-AGN-E-K9)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp365791" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;12.4(10b)JDA3&lt;/P&gt;
&lt;A name="wp365860" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;(The router software image name is &lt;EM class="cEmphasis"&gt;ap801-k9w7-tar&lt;/EM&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/ios/release/notes/jec3_jda3etsi_rn.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-4_10b_JA/command/reference/cr2410b/cr12410b-chap2.html#wpxref75622" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-4_10b_JA/command/reference/cr2410b/cr12410b-chap2.html#wpxref75622&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;H2 class="pCRC_CmdRefCommand"&gt;authentication key-management&lt;/H2&gt;
&lt;P&gt;&lt;A name="wp2495228" target="_blank"&gt;&lt;/A&gt; &lt;A name="wpmkr2496291" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pB1_Body1"&gt;Use the &lt;B style="font-weight: bold;" class="cBold"&gt;authentication key-management &lt;/B&gt;&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;SSID&lt;/SPAN&gt;&lt;B class="cBold"&gt; &lt;/B&gt;configuration mode command to configure the radio interface (for the specified SSID) to support authenticated key management. Cisco Centralized Key Management (CCKM) and Wi-Fi Protected Access (WPA) are the key management types supported on the access point.&lt;/P&gt;
&lt;P&gt;&lt;A name="wp2496305" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pCE_CmdEnv"&gt;authentication key-management &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;{[&lt;/SPAN&gt;wpa version&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;]&lt;/SPAN&gt; &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;[&lt;/SPAN&gt;cckm&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;]} [&lt;/SPAN&gt;optional&lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;] &lt;/SPAN&gt;&lt;/P&gt;
&lt;SECTION class="Note1B"&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/note.gif" alt="" /&gt;&lt;/SECTION&gt;
&lt;HR class="Cautn1table" /&gt;
&lt;P&gt;&lt;A name="wp2496306" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P class="pN1_Note1"&gt;&lt;B&gt;Note &lt;/B&gt;&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="1" /&gt;This command is not supported on bridges.&lt;/P&gt;
&lt;HR class="Cautn1table" /&gt;
&lt;P&gt;&lt;A name="wp2496343" target="_blank"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;H3 class="pCRSD_CmdRefSynDesc"&gt;Syntax Description&lt;/H3&gt;
&lt;SECTION align="left"&gt;
&lt;TABLE id="wp2496340table2496334" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0" width="80%"&gt;&lt;CAPTION&gt;&lt;/CAPTION&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2496340" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;wpa version {1 &lt;SPAN style="color: black; font-style: normal; font-weight: normal;"&gt;|&lt;/SPAN&gt; 2}&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2496342" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies WPA MFP version authenticated key management for the SSID&lt;/P&gt;
&lt;A name="wp3580240" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="19" /&gt;Version 1—WPAv1handshake for TKIP encryption&lt;/P&gt;
&lt;A name="wp3580289" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" alt="" border="0" height="2" width="19" /&gt;&lt;SPAN style="color: #ff0000;"&gt;Version 2—WPAv2 handshake for AES-CCMP encryption&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2574122" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;cckm&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2574124" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies CCKM authenticated key management for the SSID&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp2497517" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;optional&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp2497519" target="_blank"&gt;&lt;/A&gt;
&lt;P class="pB1_Body1"&gt;Specifies that client devices that do not support authenticated key management can use the SSID&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/SECTION&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242#sh ve&lt;BR /&gt;Cisco IOS Software, C1240 Software (C1240-K9W7-M), Version 12.3(7)JA1, RELEASE SOFTWARE (fc1)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2005 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Thu 06-Oct-05 09:45 by evmiller&lt;BR /&gt;&lt;BR /&gt;ROM: Bootstrap program is C1240 boot loader&lt;BR /&gt;BOOTLDR: C1240 Boot Loader (C1240-BOOT-M) Version 12.3(7)JA1, RELEASE SOFTWARE (fc1)&lt;BR /&gt;&lt;BR /&gt;1242 uptime is 4 weeks, 2 days, 19 hours, 14 minutes&lt;BR /&gt;System returned to ROM by power-on&lt;BR /&gt;System image file is "flash:/&lt;SPAN style="color: #ff0000;"&gt;c1240-k9w7-mx.123-7.JA1/c1240-k9w7-mx.123-7.JA1"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242(config)#interface Dot11Radio0&lt;BR /&gt;1242(config-if)#encryption vlan 1 mode ciphers ?&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; aes-ccm&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA AES CCMP&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; ckip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco Per packet key hashing&lt;BR /&gt;&amp;nbsp; ckip-cmic&amp;nbsp; Cisco Per packet key hashing and MIC (MMH)&lt;BR /&gt;&amp;nbsp; cmic&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco MIC (MMH)&lt;BR /&gt;&amp;nbsp; tkip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA Temporal Key encryption&lt;BR /&gt;&amp;nbsp; wep128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 128 bit key&lt;BR /&gt;&amp;nbsp; wep40&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 bit key&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1242(config-ssid)#authentication key-management wpa ?&lt;BR /&gt;&amp;nbsp; cckm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow CCKM clients&lt;BR /&gt;&amp;nbsp; optional&amp;nbsp; allow legacy clients&lt;BR /&gt;&amp;nbsp; &amp;lt;cr&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 14:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-1242-upgrade-to-support-wpa2/m-p/3036018#M144464</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-07-05T14:11:00Z</dc:date>
    </item>
  </channel>
</rss>

