cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1454
Views
5
Helpful
16
Replies

cisco 881w wireless router NVI NAT admin down and trying to setup for internet.

tazz5241
Level 1
Level 1

version 15.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname wireless
!
boot-start-marker
boot system flash c880data-universalk9-mz.154-3.M2.bin
boot-end-marker
!
!
logging buffered 51200 warnings
enable secret 5 $1$xChl$jOUaLu7Jerqpsxj6cK8Ri0
!
no aaa new-model
memory-size iomem 10
clock timezone NewYork -5 0
clock summer-time NewYork date Apr 6 2003 2:00 Oct 26 2003 2:00
!
crypto pki trustpoint TP-self-signed-2670515456
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2670515456
revocation-check none
rsakeypair TP-self-signed-2670515456
!
!
crypto pki certificate chain TP-self-signed-2670515456
certificate self-signed 02
3082022B 30820194 A0030201 02020102 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363730 35313534 3536301E 170D3138 30383033 30313135
31345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36373035
31353435 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100DF0F DCF363F2 7B60A66A 6EE3BDDD 0F63BD8C 266FD0A7 398ED3C6 B0113599
6A1C37E2 AE11AB04 13989C4E 75F61B99 16E0A454 2C91A914 F105E3CC 90E12FB8
EC71C0F0 41841AA0 9AC1E99A 06A6D7A0 2FD5FB12 E9193BEA B76DE781 79D18047
1E0600A6 AA84217F 11D89596 25789BB9 AACF9CB4 BA442313 FFEE5A56 FD3F414E
8E370203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14E891AC DFB6A753 CD2BCDD0 A358945B 250BB9FB 85301D06
03551D0E 04160414 E891ACDF B6A753CD 2BCDD0A3 58945B25 0BB9FB85 300D0609
2A864886 F70D0101 05050003 8181009A A2A123EB 09417196 2B2D5B0C 1296D507
54CAEB6C CCF28A9C E9E2B853 154E2630 AF28C4FF 451F70A5 36B4E709 4A891854
EBFC682A 11312E96 0D515A20 CA0B5465 A7C4D7BF E8608CA8 D61EBAA4 A93AF083
C1FB3EA8 6186CAD4 A447C00D 33C82688 2428267E 71D435FC 2934B0EA 82B379C2
E2FBF7F1 2997D36D A848DA8E 4B6AA5
quit
!
!
!
!
!
ip dhcp excluded-address 10.10.10.1
ip dhcp excluded-address 10.10.10.1 10.10.10.200
ip dhcp excluded-address 10.20.20.1 10.20.20.200
!
ip dhcp pool sdm-pool
import all
network 10.10.10.0 255.255.255.248
default-router 10.10.10.1
dns-server 10.10.10.1
domain-name dragonwars.com
!
ip dhcp pool network
import all
network 10.20.20.0 255.255.255.0
default-router 10.20.20.1
domain-name dragonwars.com
!
!
!
ip domain name dragonwars.com
ip name-server 192.168.1.1
ip cef
no ipv6 cef
!
!
cts logging verbose
license udi pid CISCO881W-GN-A-K9 sn FTX1249Z0BF
!
!
archive
log config
hidekeys
username admin privilege 15 secret 5 $1$.iy/$HwIkNMwpILTiOLbRxT82a1
!
!
!
!
no cdp run
!
ip ssh version 2
zone security 100
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
switchport mode trunk
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
switchport access vlan 2
no ip address
!
interface FastEthernet4
description Wan
ip address dhcp
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip address 3.3.3.3 255.255.255.0
ip nat inside
ip virtual-reassembly in
arp timeout 0
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
switchport mode trunk
no ip address
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
ip address 10.10.10.3 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1452
!
interface Vlan2
description Guest-Vlan
ip address 10.20.20.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
ip forward-protocol nd
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source list 23 interface FastEthernet4 overload
ip nat inside source list 100 interface FastEthernet4 overload
ip nat inside source list 101 interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 dhcp
!
!
access-list 100 remark CCP_ACL Category=1
access-list 100 permit ip any any
access-list 101 permit ip any any
!
line con 0
login local
no modem enable
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
line vty 0 4
access-class 101 in
privilege level 15
login local
transport input ssh
!
scheduler max-task-time 5000
!
end

wireless#sh ip int br
Interface IP-Address OK? Method Status Protocol
FastEthernet0 unassigned YES unset up up
FastEthernet1 unassigned YES unset down down
FastEthernet2 unassigned YES unset up up
FastEthernet3 unassigned YES unset down down
FastEthernet4 192.168.1.2 YES DHCP up up
NVI0 unassigned YES unset administratively down down
Vlan1 10.10.10.3 YES NVRAM up up
Vlan2 10.20.20.1 YES NVRAM up up
Wlan-GigabitEthernet0 unassigned YES unset up up
wlan-ap0 3.3.3.3 YES NVRAM up up
wireless#

2 Accepted Solutions

Accepted Solutions

Hello,

 

for the router part, configure the below:

 

ip nat inside source list 23 interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 FastEthernet4 dhcp
!
access-list 23 permit 10.10.10.3 0.0.0.255
access-list 23 permit 10.20.20.0 0.0.0.255

View solution in original post

Hello,

 

on the BVI of the AP, change the IP address to:

 

interface BVI1
ip address 10.10.10.3 255.255.255.0
no ip route-cache

View solution in original post

16 Replies 16

tazz5241
Level 1
Level 1

the ap setup is:

version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname www.dragonwars.com
!
!
logging rate-limit console 9
enable secret 5 $1$JbKq$341Z9uDAkeHKcMTO6/WI00
!
aaa new-model
!
!
aaa group server radius rad_eap
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
!
!
!
!
!
aaa session-id common
no ip cef
!
!
!
!
dot11 syslog
!
dot11 ssid Dragon
vlan 1
authentication open
authentication key-management wpa
guest-mode
mbssid guest-mode
wpa-psk ascii 0 MywirelessnetworkPassword
!
dot11 ssid dragon2.4
vlan 1
authentication open eap eap_methods
authentication network-eap eap_methods
guest-mode
!
dot11 ssid guest
vlan 2
authentication open
authentication key-management wpa
mbssid guest-mode
wpa-psk ascii 0 Wifi2018range
!
!
dot11 network-map
!
crypto pki trustpoint TP-self-signed-2700559570
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2700559570
revocation-check none
rsakeypair TP-self-signed-2700559570
!
!
crypto pki certificate chain TP-self-signed-2700559570
certificate self-signed 01
3082024A 308201B3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32373030 35353935 3730301E 170D3138 30383032 31313332
31355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 37303035
35393537 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100C749 2D9FA7CD 2A7DE256 CC468A67 E340238C 314F869C 3E45AC1E 2C8214FA
CB6C5372 A4007D70 CF3AB2CC A62FF15F A9027B12 86FAF33C BA7913E9 0A1C70F7
B2B99848 6FC519C8 4CDEA2D1 E9FFFBC7 CCC0CFAA 062819AE 2BB32009 CC332448
51BFB50C FC236C00 D473D9E0 1FE07584 AEB33CEE 9169188E E6D577E3 959CC18E
DEF90203 010001A3 72307030 0F060355 1D130101 FF040530 030101FF 301D0603
551D1104 16301482 12777777 2E647261 676F6E77 6172732E 636F6D30 1F060355
1D230418 30168014 D8A6AC7F 3A11DE7E BFA4EE5C 404F8FE4 0F0E7A0B 301D0603
551D0E04 160414D8 A6AC7F3A 11DE7EBF A4EE5C40 4F8FE40F 0E7A0B30 0D06092A
864886F7 0D010104 05000381 8100BDB3 817E42ED 9DA882B1 E0AF21A2 20B7DD55
AA1E0892 EDE164D5 3CD44804 C2908E0F 41418C20 364C877F C899A1A5 39F58919
5C5409B3 10BE4C43 EA1AF77C 6635B1F6 B08774C4 D94B4679 D9DAEF3E 18DD9EDF
8B91F64D A1A025D4 69889B84 271274E0 814DFD64 935A6F69 4F2A6262 B37D7D34
44CFB0D5 CAB9EEBC D5A985C6 E266
quit
username admin privilege 15 secret 5 $1$WmtE$BnJjyWqtPbgXF.zmi3PQk/
!
!
ip ssh version 2
!
bridge irb
!
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 1 mode ciphers tkip
!
encryption vlan 2 mode ciphers tkip
!
broadcast-key vlan 1 change 30
!
broadcast-key vlan 2 change 30
!
!
ssid Dragon
!
ssid guest
!
antenna gain -128
mbssid
station-role root
payload-encapsulation dot1h
infrastructure-client
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface GigabitEthernet0
description the embedded AP GigabitEthernet 0 is an internal interface connecting AP with the host router
no ip address
no ip route-cache
!
interface GigabitEthernet0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 spanning-disabled
no bridge-group 1 source-learning
!
interface GigabitEthernet0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 spanning-disabled
no bridge-group 2 source-learning
!
interface BVI1
ip address 10.20.20.3 255.255.255.0
no ip route-cache
!
ip forward-protocol nd
ip http server
ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
!
radius-server attribute 32 include-in-access-req format %h
radius-server vsa send accounting
!
radius server Wifi2018range
!
bridge 1 protocol ieee
bridge 1 route ip
!
!
wlccp authentication-server client mac mac_methods
wlccp wds priority 1 interface BVI1
banner exec ^CC
% Password change notice.
-----------------------------------------------------------------------

Default username/password setup on AP is cisco/cisco with privilege level 15.
It is strongly suggested that you create a new username with privilege level
15 using the following command for console security.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want to
use. After you change your username/password you can turn off this message
by configuring "no banner login" and "no banner exec" in privileged mode.

-----------------------------------------------------------------------
^C
!
line con 0
privilege level 15
no activation-character
line vty 0 4
transport input all
!
end

Hello,

 

for the router part, configure the below:

 

ip nat inside source list 23 interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 FastEthernet4 dhcp
!
access-list 23 permit 10.10.10.3 0.0.0.255
access-list 23 permit 10.20.20.0 0.0.0.255

thanks for the help on the router part you have any clue for the wireless part to distribute internet on that? i have it working now on the router from the missing section you gave me.

Hello,

 

on the BVI of the AP, change the IP address to:

 

interface BVI1
ip address 10.10.10.3 255.255.255.0
no ip route-cache

now i changed the bvi1 and see this running on the system----

*Aug 5 12:35:22.989: %IP-4-DUPADDR: Duplicate address 10.10.10.3 on Vlan1, sourced by 0021.a0f7.44d2
*Aug 5 12:35:52.989: %IP-4-DUPADDR: Duplicate address 10.10.10.3 on Vlan1, sourced by 0021.a0f7.44d2
*Aug 5 12:36:22.989: %IP-4-DUPADDR: Duplicate address 10.10.10.3 on Vlan1, sourced by 0021.a0f7.44d2
*Aug 5 12:36:52.989: %IP-4-DUPADDR: Duplicate address 10.10.10.3 on Vlan1, sourced by 0021.a0f7.44d2
*Aug 5 12:37:23.477: %IP-4-DUPADDR: Duplicate address 10.10.10.3 on Vlan1, sourced by 0021.a0f7.

Sorry for that, I made a typo, address should be 10.10.10.4:

 

interface BVI1
ip address 10.10.10.4 255.255.255.0
no ip route-cache

i have done some config's to the ap side and have got nothing feeding out or can't get a wifi connection but the signal is working i can see that. I need help to reconfigure the ap to supply the internet out for the wifi, please... I have done it on ccp and on telnet.... any suggestions??

 

version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname www.dragonwars.com
!
!
logging rate-limit console 9
enable secret 5 $1$JbKq$341Z9uDAkeHKcMTO6/WI00
!
aaa new-model
!
!
aaa group server radius rad_eap
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authorization exec default local
aaa accounting network acct_methods start-stop group rad_acct
!
!
!
!
!
aaa session-id common
no ip cef
!
!
!
!
dot11 syslog
!
dot11 ssid Dragon
vlan 1
authentication open
authentication key-management wpa
guest-mode
mbssid guest-mode
wpa-psk ascii 0 Wifi2018ranger
!
dot11 ssid guest
vlan 2
authentication open
authentication key-management wpa
mbssid guest-mode
wpa-psk ascii 0 Wifi2018ranger
!
!
dot11 network-map
!
crypto pki trustpoint TP-self-signed-2700559570
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2700559570
revocation-check none
rsakeypair TP-self-signed-2700559570
!
!
crypto pki certificate chain TP-self-signed-2700559570
certificate self-signed 01
3082024A 308201B3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32373030 35353935 3730301E 170D3138 30383032 31313332
31355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 37303035
35393537 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100C749 2D9FA7CD 2A7DE256 CC468A67 E340238C 314F869C 3E45AC1E 2C8214FA
CB6C5372 A4007D70 CF3AB2CC A62FF15F A9027B12 86FAF33C BA7913E9 0A1C70F7
B2B99848 6FC519C8 4CDEA2D1 E9FFFBC7 CCC0CFAA 062819AE 2BB32009 CC332448
51BFB50C FC236C00 D473D9E0 1FE07584 AEB33CEE 9169188E E6D577E3 959CC18E
DEF90203 010001A3 72307030 0F060355 1D130101 FF040530 030101FF 301D0603
551D1104 16301482 12777777 2E647261 676F6E77 6172732E 636F6D30 1F060355
1D230418 30168014 D8A6AC7F 3A11DE7E BFA4EE5C 404F8FE4 0F0E7A0B 301D0603
551D0E04 160414D8 A6AC7F3A 11DE7EBF A4EE5C40 4F8FE40F 0E7A0B30 0D06092A
864886F7 0D010104 05000381 8100BDB3 817E42ED 9DA882B1 E0AF21A2 20B7DD55
AA1E0892 EDE164D5 3CD44804 C2908E0F 41418C20 364C877F C899A1A5 39F58919
5C5409B3 10BE4C43 EA1AF77C 6635B1F6 B08774C4 D94B4679 D9DAEF3E 18DD9EDF
8B91F64D A1A025D4 69889B84 271274E0 814DFD64 935A6F69 4F2A6262 B37D7D34
44CFB0D5 CAB9EEBC D5A985C6 E266
quit
username admin privilege 15 secret 5 $1$WmtE$BnJjyWqtPbgXF.zmi3PQk/
!
!
ip ssh version 2
!
bridge irb
!
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 1 mode ciphers tkip
!
encryption vlan 2 mode ciphers tkip
!
broadcast-key vlan 1 change 30
!
broadcast-key vlan 2 change 30
!
!
ssid Dragon
!
ssid guest
!
antenna gain -128
station-role root
payload-encapsulation dot1h
infrastructure-client
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Dot11Radio0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface GigabitEthernet0
description the embedded AP GigabitEthernet 0 is an internal interface connecting AP with the host router
no ip address
no ip route-cache
!
interface GigabitEthernet0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 spanning-disabled
no bridge-group 1 source-learning
!
interface GigabitEthernet0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 spanning-disabled
no bridge-group 2 source-learning
!
interface BVI1
ip address 10.10.10.4 255.255.255.0
no ip route-cache
!
ip forward-protocol nd
ip http server
ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip radius source-interface BVI1
!
!
radius-server attribute 32 include-in-access-req format %h
radius-server vsa send accounting
!
radius server Wifi2018range
!
bridge 1 protocol ieee
bridge 1 route ip
bridge 2 protocol ieee
bridge 2 route ip
!
!
!
line con 0
privilege level 15
no activation-character
line vty 0 4
transport input all
!
end

www.dragonwars.com(config)#
*Mar 1 04:36:10.330: %DOT11-7-AUTH_FAILED: Station 100d.7ffc.dd7e Authentication failedversion 15.2

Hello,

 

remove the below, you only need this for the native Vlan:

 

bridge 1 protocol ieee
bridge 1 route ip
--> no bridge 2 protocol ieee
--> no bridge 2 route ip

Also, there is a typo in the access list (it shouldn't make a difference but correct it anyway):

 

access-list 23 permit 10.10.10.3 0.0.0.255
access-list 23 permit 10.20.20.0 0.0.0.255

 

should be:

 

access-list 23 permit 10.10.10.0 0.0.0.255
access-list 23 permit 10.20.20.0 0.0.0.255

ok i did that but i am using 2 vlans but from ccp it does not show any transmissions receiving. i have been trying to get both ways working. 

Hello,

 

can you get to the command line and use that instead of CCP ?

 

Either way, are your wireless clients at least seeing your networks ? Are they getting an IP address ?

yes i can get in the cmd line and do the work that way too. it is showing tx send and recieving on that side but not on the wireless ap end. there is something that has to be with the vlans not transmitting or i might have put in the wrong one but thought i was close to getting it running showing guest key set on open and connect to it but no internet it was d=same with dragon ssid.

Do your wireless clients get an IP address ?

I checked your config again, the default router in your first DHCP pool doesn't match the IP address of Vlan 1. The IP addresses marked in bold need to be the same, so change either one or another:

 

ip dhcp pool sdm-pool
import all
network 10.10.10.0 255.255.255.248
default-router 10.10.10.1
dns-server 10.10.10.1
domain-name dragonwars.com

 

interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$
ip address 10.10.10.3 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1452

 

 

Review Cisco Networking products for a $25 gift card