<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Point 352 wiht IOS in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269999#M54556</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;all the wireless client get ip address from the DHCP server. The wireless client keep at this asscociation processing atage . The same mac address stuck there till Client off power (after work).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Sep 2004 02:51:21 GMT</pubDate>
    <dc:creator>mcnaz-yeo</dc:creator>
    <dc:date>2004-09-24T02:51:21Z</dc:date>
    <item>
      <title>Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269997#M54554</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   Need some advise, some of my AP encounter the appended 0.0.0.0 ip addressing with state either is associated or association processing, Need valuable feedback, Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Device Type  Name IP Address  MAC Address  State Parent VLAN &lt;/P&gt;&lt;P&gt;- - 0.0.0.0 0004.2392.5831  Associated self none &lt;/P&gt;&lt;P&gt;- - 0.0.0.0 0004.23a3.ee85  Associated self none &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mc&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 16:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269997#M54554</guid>
      <dc:creator>mcnaz-yeo</dc:creator>
      <dc:date>2021-07-04T16:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269998#M54555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AP is a layer 2 device. Within 802.11 authentication and association or 802.1x authentication process, the AP does not pick up IP address of the wireless client. The AP learns the IP address of the wireless client when the wireless client sends out an IP frame.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are seeing may be normal. Do you configure static IP address on the wireless client? Or does the wireless client get an IP address from a DHCP server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2004 18:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269998#M54555</guid>
      <dc:creator>dixho</dc:creator>
      <dc:date>2004-09-23T18:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269999#M54556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;all the wireless client get ip address from the DHCP server. The wireless client keep at this asscociation processing atage . The same mac address stuck there till Client off power (after work).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2004 02:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/269999#M54556</guid>
      <dc:creator>mcnaz-yeo</dc:creator>
      <dc:date>2004-09-24T02:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270000#M54557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do the wireless client get an IP address from the DHCP server? Do you enable encryption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If encryption is enable (i.e. WEP), I will disable it and find out if the wireless clients can get an IP address or not. If you disable encryption fixes the problem, I think that the static WEP keys on the wireless clients and on the AP do not match.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Sep 2004 15:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270000#M54557</guid>
      <dc:creator>dixho</dc:creator>
      <dc:date>2004-09-24T15:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270001#M54558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes all the client get there ip address from the DHCP server, yes it is encryptiob with wep enable, The wep key is dymanic not quite possible for the wireless client to know the wep, Your advise please. Those client are centrino CCX mostly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mc  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Sep 2004 06:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270001#M54558</guid>
      <dc:creator>mcnaz-yeo</dc:creator>
      <dc:date>2004-09-25T06:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270002#M54559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am confused. If you want dynamic WEP keys, you need to enable one of the 802.1x types or WPA-PSK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the output of show dot11 association, the state of the wireless clients is "Associated." If the clients use one of the 802.1x types, the output of show dot11 association should show the state as "LEAP-Assoc" or "EAP-Assoc" I deduce that you configure WPA-PSK. Can you confirm that you use WPA-PSK? Please post the AP configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Sep 2004 17:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270002#M54559</guid>
      <dc:creator>dixho</dc:creator>
      <dc:date>2004-09-25T17:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270003#M54560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   Sorry for the confuseion, please view the configuration&lt;/P&gt;&lt;P&gt;SDC#sh ru&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 5163 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;! Last configuration change at 19:52:06 H Mon Aug 30 2004&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 19:52:06 H Mon Aug 30 2004&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime localtime&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname SDC&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging queue-limit 100&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging console informational&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username xxx privilege 15 password xxxx&lt;/P&gt;&lt;P&gt;clock timezone H 8&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip domain name default.domain&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_acct&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt; server 10.x.101.x auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login mac_methods local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;dot11 network-map&lt;/P&gt;&lt;P&gt;no dot11 igmp snooping-helper&lt;/P&gt;&lt;P&gt;iapp standby timeout 5&lt;/P&gt;&lt;P&gt;iapp standby poll-frequency 1&lt;/P&gt;&lt;P&gt;!         &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption mode wep mandatory &lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid tsunami&lt;/P&gt;&lt;P&gt;    authentication open eap eap_methods&lt;/P&gt;&lt;P&gt;    authentication network-eap eap_methods &lt;/P&gt;&lt;P&gt;    accounting acct_methods&lt;/P&gt;&lt;P&gt;    infrastructure-ssid optional&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; traffic-class background cw-min 5 cw-max 8 fixed-interface FastEthernet0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; ntp broadcast client&lt;/P&gt;&lt;P&gt; bridge-group 1&lt;/P&gt;&lt;P&gt; no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt; bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt; ip address 10.x.99.x 255.255.0.0&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 10.x.99.8&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http help-path &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100" target="_blank"&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ip http authentication aaa&lt;/P&gt;&lt;P&gt;ip radius source-interface BVI1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended Voice_Over_IP_300&lt;/P&gt;&lt;P&gt; permit 119 any any&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;ip access-list extended Voice_Over_IP_301&lt;/P&gt;&lt;P&gt; permit 119 any any&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;logging facility local0&lt;/P&gt;&lt;P&gt;access-list 111 permit tcp any any neq telnet&lt;/P&gt;&lt;P&gt;snmp-server view iso_view iso included&lt;/P&gt;&lt;P&gt;snmp-server community admin view iso_view RW&lt;/P&gt;&lt;P&gt;snmp-server location avc&lt;/P&gt;&lt;P&gt;snmp-server contact xxxx&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication&lt;/P&gt;&lt;P&gt;snmp-server enable traps tty&lt;/P&gt;&lt;P&gt;snmp-server enable traps disassociate&lt;/P&gt;&lt;P&gt;snmp-server enable traps deauthenticate&lt;/P&gt;&lt;P&gt;snmp-server enable traps authenticate-fail&lt;/P&gt;&lt;P&gt;radius-server host 10.x.x.x auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7 &lt;/P&gt;&lt;P&gt;radius-server host 10.x.x.x auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7 &lt;/P&gt;&lt;P&gt;radius-server host 10.x.x.x auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7 &lt;/P&gt;&lt;P&gt;radius-server deadtime 2&lt;/P&gt;&lt;P&gt;radius-server authorization permit missing Service-Type&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;radius-server vsa send authentication&lt;/P&gt;&lt;P&gt;bridge 1 route ip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 111 in&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; access-class 111 in&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ntp clock-period 17189129&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2004 13:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270003#M54560</guid>
      <dc:creator>mcnaz-yeo</dc:creator>
      <dc:date>2004-10-04T13:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270004#M54561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configuration looks OK. What kind of 802.1x type do you use? show dot11 assoc should show EAP-Assoc if the wireless client is EAP associated, which is configured on the AP. I have the following questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If you configure static IP, do you have IP connectivity?&lt;/P&gt;&lt;P&gt;2. Please go to the radius server log, do you see the radius server grants access to the wireless clients?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Oct 2004 18:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270004#M54561</guid>
      <dc:creator>dixho</dc:creator>
      <dc:date>2004-10-04T18:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: Access Point 352 wiht IOS</title>
      <link>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270005#M54562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;   Thanks for the prompt reply, Currently we've peap, eap-tls and leap authenication, I presume all are 802.1x,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If you configure static IP, do you have IP connectivity? &lt;/P&gt;&lt;P&gt; Yes I able to get connectivity to the AP&lt;/P&gt;&lt;P&gt;2. Please go to the radius server log, do you see the radius server grants access to the wireless clients? &lt;/P&gt;&lt;P&gt; FYI all the client are using Active direvtory for authenicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Oct 2004 00:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/access-point-352-wiht-ios/m-p/270005#M54562</guid>
      <dc:creator>mcnaz-yeo</dc:creator>
      <dc:date>2004-10-05T00:30:42Z</dc:date>
    </item>
  </channel>
</rss>

