cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
12762
Views
5
Helpful
8
Replies

how to enable a and g radio on 2602 AP

carl_townshend
Spotlight
Spotlight

Hi all

 

I have recently installed a 2602 Standalone AP, However I can only see the N radio config on it, I cant see anyting about a,b or g ?

 

how do I switch these on ?

 

cheers

 

 

8 Replies 8

Sandeep Choudhary
VIP Alumni
VIP Alumni

The 2.4-GHz radio and 2.4-GHz N radio is radio 0, and the 5-GHz radio and 5-GHz N radios radio 1.

Use these commands to enable:

config t

interface dot11radio 0

no shut

!

interface dot11radio 1

no shut

 

Regards

You must use a SSID on the radio interface otherwise the radio will not activate.

try this.

Conf t

dot11 SSID [name]

auth open

guestmode

!

inter dot11 0

SSID [name]

no shut

!

Inter dot11 1

SSID [name]

no shut

 

Abhishek Abhishek
Cisco Employee
Cisco Employee

Disabling and Enabling the Radio Interface

The access point radios are enabled by default. Beginning in privileged EXEC mode, follow these steps to disable the access point radio:

 

 
 
Command
Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface dot11radio { 0 | 1 }

Enter interface configuration mode for the radio interface. The 2.4-GHz radio is radio 0, and the 5-GHz radio is radio 1.

Step 3 

shutdown

Disable the radio port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

copy running-config startup-config

(Optional) Save your entries in the configuration file.

 

Use the no form of the shutdown command to enable the radio port.

abwahid
Level 4
Level 4

Hi,

Yes, to enable the Radio of 2.4GHz and 5GHz, command is same provided by sundeep.

Further in wireless settings page in Wireless LAN section you have drop down of operating mode>

here you can select the b/g, b/g/n mode a/n mode or all those.

 

 

Abhishek Abhishek
Cisco Employee
Cisco Employee

Disabling and Enabling the Radio Interface

The access point radios are enabled by default. Beginning in privileged EXEC mode, follow these steps to disable the access point radio:

 

 
 
Command
Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface dot11radio { 0 | 1 }

Enter interface configuration mode for the radio interface. The 2.4-GHz radio is radio 0, and the 5-GHz radio is radio 1.

Step 3 

shutdown

Disable the radio port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

copy running-config startup-config

(Optional) Save your entries in the configuration file.

 

Use the no form of the shutdown command to enable the radio port.

How i can do this in the GUI Web Frontend?

At the CLI ok, but i have also problem, that the SSID are not visible on the phone.

When i connect manual i have no access to the internet.

 

m.rana.ku
Level 1
Level 1

Hi,

In the following video step by step process has been shown How to Configure Cisco AIRONET 3602i Autonomous/Standalone Access Point using CLI with WPAv2 Authentication Key.

 

https://www.youtube.com/channel/UCmZZ2BNGXQH1HPS3uIVnr7A?sub_confirmation=1

 

https://www.youtube.com/watch?v=JkUfTXuwj2U

 

============ For 2.4 GHz Radio Interface ============

Step 1: Access Cisco AP|Reset AP| Assign static IP for BVI1 Interface |Default-gateway IP
ap>enable
Password: Cisco [Cisco AP default Password]
## Reset the Access Point with pressing and holding mode button ##
ap#configure terminal
ap(config)#interface bvI 1
ap(config-if)#ip address 192.168.2.4 255.255.255.0 [According to my network setup]
ap(config-if)#exit
ap(config)#ip default-gateway 192.168.2.1 [According to my network setup]

Step 2: Creating SSID | Authentication | Applying WPAv2 Authentication

ap(config)#dot11 ssid Cisco_WLAN [ Create SSID named Cisco_WLAN]
ap(config-ssid)#guest-mode [Broadcast SSID]
ap(config-ssid)#authentication open [allows any device to authenticate]
ap(config-ssid)#authentication key-management wpa version 2 [Applying WPAv2 Authentication]
ap(config-ssid)#wpa-psk ascii Cisco123 [Applying WPA Shared Key ]
ap(config-ssid)#exit

Step 3: Enable Encryption to 4.2GHz Radio interface | Apply SSID to interface| Enable Radio Interface

ap(config)#interface dot11Radio 0 [Selecting 4.2 GHz Radio interface]
ap(config-if)#encryption mode ciphers aes-ccm [Enabling CIPHER AES-CCM Encryption to interface]
ap(config-if)#ssid Cisco_WLAN [Applying SSID to Radio interface]
ap(config-if)#channel least-congested [Selecting Channel type]
ap(config-if)#no shutdown [Finally Enabling the 4.2 GHz Radio Interface]
ap(config-if)#exit
ap(config)#exit
================ For 5 GHz Radio Interface =======================

Step 2: Creating SSID | Authentication | Applying WPAv2 Authentication

ap(config)#dot11 ssid Cisco_WLAN 5GHz [ Create SSID named Cisco_WLAN 5GHz ]
ap(config-ssid)#guest-mode [Broadcast SSID]
ap(config-ssid)#authentication open [allows any device to authenticate]
ap(config-ssid)#authentication key-management wpa version 2 [Applying WPAv2 Authentication]
ap(config-ssid)#wpa-psk ascii Cisco123 [Applying WPA Shared Key ]
ap(config-ssid)#exit

Step 3: Enable Encryption to 5 GHz Radio interface | Apply SSID to interface| Enable Radio Interface

ap(config)#interface dot11Radio 1 [Selecting 5 GHz Radio interface]
ap(config-if)#encryption mode ciphers aes-ccm [Enabling CIPHER AES-CCM Encryption to interface]
ap(config-if)#ssid Cisco_WLAN 5GHz [Applying SSID to Radio interface]
ap(config-if)# channel 36 [Selecting Channel type]
ap(config-if)#no shutdown [Finally Enabling the 5 GHz Radio Interface]
ap(config-if)#exit
ap(config)#exit

interface31
Level 1
Level 1

Thank you i got it in in the WebUI

 

At the Event Log i got this messages is this normal or something wrong?

Time	Severity	Description
Mar 1 04:37:49.182	Warning	Packet to client 98f4.abb8.d973 reached max retries, removing the client
Mar 1 04:37:49.166	Information	Interface Dot11Radio0, Deauthenticating Station 98f4.abb8.d973 Reason: Sending station has left the BSS
Mar 1 04:37:39.438	Warning	Packet to client 98f4.abb8.dc4c reached max retries, removing the client
Mar 1 04:37:39.430	Information	Interface Dot11Radio0, Deauthenticating Station 98f4.abb8.dc4c Reason: Sending station has left the BSS
Mar 1 04:37:36.582	Warning	Packet to client 84f3.ebe5.c52f reached max retries, removing the client
Mar 1 04:37:36.574	Information	Interface Dot11Radio0, Deauthenticating Station 84f3.ebe5.c52f Reason: Sending station has left the BSS
Mar 1 04:37:23.038	Information	Interface Dot11Radio0, Station 98f4.abb8.d973 Associated KEY_MGMT[WPAv2 PSK]
Mar 1 04:37:19.170	Warning	Packet to client 98f4.abb8.d973 reached max retries, removing the client
Mar 1 04:37:19.166	Information	Interface Dot11Radio0, Deauthenticating Station 98f4.abb8.d973 Reason: Sending station has left the BSS
Mar 1 04:36:39.898	Information	Interface Dot11Radio0, Station 98f4.abb8.d973 Associated KEY_MGMT[WPAv2 PSK]

 

Review Cisco Networking for a $25 gift card