05-13-2011 03:26 PM - edited 07-03-2021 08:12 PM
I have a problem with no wireless subinterfaces an IOS version with a 151-1.T2.bin
05-13-2011 07:09 PM
I have a problem with no wireless subinterfaces an IOS version with a 151-1.T2.bin
C'mon mate. You should know this by now since you've been creating alot of threads. Give us the details please.05-13-2011 11:15 PM
Okay I have two routers a dezefde Version 15.0 (a) M4 and the other is Version 15.1 (a) T2 with the Version 15.0 (1) M4, I can create subinterfaces on 3 would like to have but the other two I can not subinterfaces to and get no IP addresses on the ssid's someone who is how you can solve, because it really necessary for my studies
05-14-2011 10:24 AM
I geconfigureert but this does not work?
interface Vlan1
description LAN
ip address 10.10.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1452
ip access-list extended R1.ACL
deny ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255
deny ip 20.20.20.0 0.0.0.255 20.20.10.0 0.0.0.255
permit ip 10.10.10.0 0.0.0.255 any
permit ip 20.20.20.0 0.0.0.255 any
dot11 ssid CISCO_Private
vlan 1
authentication open
authentication key-management wpa version 2
guest-mode
wpa-psk ascii 0 ******************
nterface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 1 mode ciphers aes-ccm tkip
!
ssid CISCO_Private
!
antenna gain 0
speed basic-1.0 basic-2.0 basic-5.5 basic-11.0 basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
station-role root
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface GigabitEthernet0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
!
interface BVI1
ip address dhcp client-id GigabitEthernet0
no ip route-cache
!
ip http server
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
bridge 1 protocol ieee
bridge 1 route ip
05-15-2011 03:22 PM
05-15-2011 03:41 PM
I've tried that but I can not get more in the wireless mode to an ip address that he asks
05-17-2011 09:46 AM
I've tried but I can not ssid 4 to make it I get no dhcp on how you can fix this, have you ever done a four SSID on your router and created works that...
05-17-2011 02:55 PM
I've tried but I can not ssid 4
What router and/or AP is this?05-17-2011 03:01 PM
because one would like to ap ssid for testing but do not get a ip address to know how can you fix this
05-17-2011 03:05 PM
What is the model of your router and/or your AP?
05-17-2011 03:12 PM
I have a Cisco 891W router
05-17-2011 03:11 PM
05-17-2011 03:17 PM
I can make three to fourth but would still like to make testing but do not get the ip address dhcp
05-17-2011 03:19 PM
Ok. 891W. Please post your config. Remove the passwords.
05-17-2011 04:02 PM
oke the configs
AP
-------------------------------------------------------------------------------------
Building configuration...
Current configuration : 6497 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2.ap
!
enable secret 5 $1$Ywjo$szj/2jGgCxFL/usSlaGyX1
!
aaa new-model
!
!
!
aaa session-id common
!
!
dot11 syslog
!
dot11 ssid CISCO_R2_2.4GHZ_Guest
vlan 4
authentication open
authentication key-management wpa version 2
mbssid guest-mode
wpa-psk ascii 0
!
dot11 ssid CISCO_R2_2.4GHZ_Private
vlan 2
authentication open
authentication key-management wpa version 2
mbssid guest-mode
wpa-psk ascii 0
!
dot11 ssid CISCO_R2_2.4GHZ_Study
vlan 3
authentication open
authentication key-management wpa version 2
mbssid guest-mode
wpa-psk ascii 0
!
dot11 ssid CISCO8_R2_2.4GHZ_Testing
vlan 5
authentication open
authentication key-management wpa version 2
mbssid guest-mode
wpa-psk ascii 0
!
!
crypto pki trustpoint TP-self-signed-1968951208
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1968951208
revocation-check none
rsakeypair TP-self-signed-1968951208
!
!
crypto pki certificate chain TP-self-signed-1968951208
certificate self-signed 01
30820248 308201B1 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31393638 39353132 3038301E 170D3130 30373138 30323537
35365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 39363839
35313230 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100BA02 F9C8FD66 B6753332 39673712 3E8769A3 DA570286 F5325C16 23F214AB
8E177C69 B168B1D7 DFCB9441 AAE7BCEB C6F77C6C 03FD0C48 21C87C59 8F910C5C
9C12A862 C6A42C75 089D841E C661E383 D8F5CDF9 D707600A 248B5C52 04B073C3
DDD8E50B 1C550A57 F9B9A79A 9159DFB7 22815053 3CCEF64F 09B2616C 0DABB290
E64D0203 010001A3 70306E30 0F060355 1D130101 FF040530 030101FF 301B0603
551D1104 14301282 1052322E 61702E74 656C656E 65742E62 65301F06 03551D23
04183016 80146374 685C3826 88464C3F 32F91F62 4012F6A5 DBA2301D 0603551D
0E041604 14637468 5C382688 464C3F32 F91F6240 12F6A5DB A2300D06 092A8648
86F70D01 01040500 03818100 85BAA243 FD0BE1F2 1A6D3F5E AB47CFFD A583DC06
69809691 606B8EFE BA5EBFB7 3647FBB3 CD97646F 7638C0A4 3B13FFB4 5E7EB7EC
286D604C BE064BAB F0D4D40E C3304D0C 6CE433B5 9F4A11A8 CC03260E C207C204
1D3ED405 0EC74926 0F6C072D 78BA5418 44392F7C E06859C7 9F51AAB2 F7983A0C
7D0852EE B4C3B759 4556113C
quit
username Tim privilege 15 secret 5 $1$sKG9$GhQxwehNZMkmI4XYl3fd.0
username Cisco privilege 15 secret 5 $1$5fB8$GIkNOfCyQZpPqb1.Z8pKl0
!
!
bridge irb
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 2 mode ciphers aes-ccm tkip
!
encryption vlan 3 mode ciphers aes-ccm tkip
!
encryption vlan 4 mode ciphers aes-ccm tkip
!
encryption vlan 5 mode ciphers aes-ccm tkip
!
ssid CISCO_R2_2.4GHZ_Guest
!
ssid CISCO_R2_2.4GHZ_Private
!
ssid CISCO_R2_2.4GHZ_Study
!
ssid CISCO_R2_2.4GHZ_Testing
!
antenna gain 0
mbssid
speed basic-1.0 basic-2.0 basic-5.5 basic-11.0 basic-6.0 basic-9.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
station-role root
rts retries 128
!
interface Dot11Radio0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
!
interface Dot11Radio0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface Dot11Radio0.3
encapsulation dot1Q 3
no ip route-cache
bridge-group 3
bridge-group 3 subscriber-loop-control
bridge-group 3 block-unknown-source
no bridge-group 3 source-learning
no bridge-group 3 unicast-flooding
bridge-group 3 spanning-disable
!
interface Dot11Radio0.4
encapsulation dot1Q 4
no ip route-cache
bridge-group 4
bridge-group 4 subscriber-loop-control
bridge-group 4 block-unknown-source
no bridge-group 4 source-learning
no bridge-group 4 unicast-flooding
bridge-group 4 spanning-disabled
!
interface Dot11Radio0.5
encapsulation dot1Q 5
no ip route-cache
bridge-group 5
bridge-group 5 subscriber-loop-control
bridge-group 5 block-unknown-source
no bridge-group 5 source-learning
!
interface Dot11Radio1
no ip address
no ip route-cache
shutdown
antenna gain 0
no dfs band block
channel dfs
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
!
interface GigabitEthernet0
description the embedded AP GigabitEthernet 0 is an internal interface connecting AP with the host router
no ip address
no ip route-cache
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
!
interface GigabitEthernet0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
no bridge-group 2 source-learning
bridge-group 2 spanning-disabled
!
interface GigabitEthernet0.3
encapsulation dot1Q 3
no ip route-cache
bridge-group 3
no bridge-group 3 source-learning
bridge-group 3 spanning-disabled
!
interface GigabitEthernet0.4
encapsulation dot1Q 4
no ip route-cache
bridge-group 4
no bridge-group 4 source-learning
bridge-group 4 spanning-disabled
!
interface GigabitEthernet0.5
encapsulation dot1Q 5
no ip route-cache
bridge-group 5
no bridge-group 5 source-learning
bridge-group 5 spanning-disabled
!
interface BVI1
ip address 10.10.20.2 255.255.255.0
no ip route-cache
!
ip default-gateway 10.10.20.1
ip http server
ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
bridge 1 route ip
bridge 2 protocol ieee
bridge 4 protocol ieee
bridge 5 protocol ieee
--------------------------------------------------------------------------------
router
--------------------------------------------------------------------------------
Building configuration...
Current configuration : 7181 bytes
!
! Last configuration change at 22:34:07 UTC Tue May 17 2011 by Tim
!
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 warnings
!
aaa new-model
!
!
aaa authentication login default local
!
!
!
!
!
aaa session-id common
!
!
!
memory-size iomem 10
service-module wlan-ap 0 bootimage autonomous
!
crypto pki trustpoint TP-self-signed-3945582034
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3945582034
revocation-check none
rsakeypair TP-self-signed-3945582034
!
!
crypto pki certificate chain TP-self-signed-3945582034
certificate self-signed 01
30820245 308201AE A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33393435 35383230 3334301E 170D3131 30343236 31333137
30345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 39343535
38323033 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100900D 6293E313 40744659 1E2A4047 E9844B53 240B241D 711B5B64 E75F2063
2D6CDE1B 52A3F448 BFEC9B67 16816048 04DBBD55 85235244 048CC4C4 DEDAA702
9954D740 D50B2ED8 3DF3F681 A5553D5B AEA90921 FB6C2757 C23B12D1 B8121A23
4B752336 A329E1A8 7E74AB8F 043D73AE D41FE2CA 1B3A238F 9071779C EF2B3A37
E2F70203 010001A3 6D306B30 0F060355 1D130101 FF040530 030101FF 30180603
551D1104 11300F82 0D52322E 63757273 6973742E 6265301F 0603551D 23041830
1680144A 5C914FA9 9D03D187 6DE957BE ED699CB0 46CB0530 1D060355 1D0E0416
04144A5C 914FA99D 03D1876D E957BEED 699CB046 CB05300D 06092A86 4886F70D
01010405 00038181 0027B4A2 5B66B9E9 5E579320 F280E047 3BDC4B0F AB852BFA
1C480D16 3C3E3A86 998EB525 56375C41 E92CA8DC D9EB2583 E685145D B536B4BD
7E1B3213 086CC86C FB20A91F 4A0A8A67 C5848F49 89BDF700 D6EA83FB 6533E802
6A0BA747 54476B9C 1060D035 DDA6C526 B6FED37E 0D1CB29F 7A8C4B11 46BAF5CD
706666CF 00E710A2 C9
quit
ip source-route
!
!
!
ip dhcp pool R2.LAN
import all
network 10.10.20.0 255.255.255.0
default-router 20.20.10.1
dns-server 195.130.131.132 195.130.130.4
lease infinite
!
ip dhcp pool R2.CISCO_R2_2.4GHZ_Private
import all
network 20.20.10.0 255.255.255.0
default-router 20.20.10.1
dns-server 195.130.131.132 195.130.130.4
lease infinite
!
ip dhcp pool R2.CISCO_R2_2.4GHZ_Study
import all
network 30.30.40.0 255.255.255.0
default-router 30.30.40.1
lease infinite
!
ip dhcp pool R2.CISCO_R2_2.4GHZ_Guest
import all
network 40.40.30.0 255.255.255.0
default-router 40.40.30.1
lease infinite
!
ip dhcp pool R2.CISCO_2.4GHZ_Testing
import all
network 50.50.60.0 255.255.255.0
default-router 50.50.60.1
lease infinite
!
!
ip cef
ip domain name
ip name-server 195.130.131.132
ip name-server 195.130.130.4
ipv6 unicast-routing
ipv6 cef
!
!
!
!
archive
log config
logging enable
path flash:R2.standard.running-config
username Tim privilege 15 secret 5 $1$SQFs$zojYx5GmAMV.1q33BwRxu0
username Cisco privilege 15 secret 5 $1$CdKz$SOMtjCVR5AO6GW6Ug23Rq/
!
!
ip ssh rsa keypair-name
ip ssh version 2
ip scp server enable
!
!
crypto isakmp policy 10000
encr aes 256
authentication pre-share
group 16
crypto isakmp key
!
!
!
crypto map R2.CMAP 10000 ipsec-isakmp
set peer
set pfs group16
match address Remote-VPN
qos pre-classify
!
!
!
!
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
!
interface FastEthernet0
!
!
interface FastEthernet1
!
!
interface FastEthernet2
!
!
interface FastEthernet3
!
!
interface FastEthernet4
!
!
interface FastEthernet5
!
!
interface FastEthernet6
!
!
interface FastEthernet7
!
!
interface FastEthernet8
description WAN
ip address dhcp client-id FastEthernet8
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
!
!
interface GigabitEthernet0
description WAN
ip address dhcp client-id GigabitEthernet0
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
crypto map R2.CMAP
!
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
arp timeout 0
!
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
switchport mode trunk
!
!
interface Vlan1
ip address 10.10.20.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
!
interface Vlan2
ip address 20.20.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
!
interface Vlan3
description R2-VLAN3
ip address 30.30.40.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
!
interface Vlan4
ip address 40.40.30.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
!
interface Vlan5
ip address 50.50.60.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
!
ip forward-protocol nd
ip http server
ip http access-class 20
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source static tcp 10.10.20.1 22 interface GigabitEthernet0 4000
ip nat inside source list R2-ACL interface GigabitEthernet0 overload
ip nat inside source static tcp 20.20.10.4 631 interface GigabitEthernet0 6000
ip nat inside source static tcp 20.20.10.1 22 interface GigabitEthernet0 7000
ip nat inside source static tcp 20.20.10.8 3389 84.197.168.249 3389 extendable
!
ip access-list extended R2-ACL
deny ip 10.10.20.0 0.0.0.255 10.10.10.0 0.0.0.255
permit ip 10.10.20.0 0.0.0.255 any
deny ip 20.20.10.0 0.0.0.255 20.20.20.0 0.0.0.255
permit ip 20.20.10.0 0.0.0.255 any
deny ip 30.30.40.0 0.0.0.255 30.30.30.0 0.0.0.255
permit ip 30.30.40.0 0.0.0.255 any
deny ip 40.40.30.0 0.0.0.255 40.40.40.0 0.0.0.255
permit ip 40.40.30.0 0.0.0.255 any
ip access-list extended Remote-VPN
permit ip 10.10.20.0 0.0.0.255 10.10.10.0 0.0.0.255
permit ip 20.20.10.0 0.0.0.255 20.20.20.0 0.0.0.255
permit ip 30.30.40.0 0.0.0.255 30.30.30.0 0.0.0.255
permit ip 40.40.30.0 0.0.0.255 40.40.40.0 0.0.0.255
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide