Cisco Systems CSACS1121K9 manual OL-4309-07

Page 102

Appendix E Priming Lightweight Access Points Prior to Deployment

Before deploying your lightweight access points to their final locations, follow these steps to prime your access points:

Step 1 In a Layer 3 environment, ensure a DHCP server (typically on your switch) is enabled on the same subnet as your lightweight access points. The access points receives its IP address and controller information using DHCP Option 43.

The lightweight access point must be able to find the IP address of the controller. This can be accomplished using DHCP, DNS, OTAP, or IP subnet broadcast. This guide describes the DHCP method to convey the controller IP address. For other methods, refer to the product documentation. See also the “Using DHCP Option 43” section on page 6-2for more information.

Note For a Layer 3 access point on a different subnet than the controller, ensure the route to the controller has destination UDP ports 12222 and 12223 open for LWAPP communications. Ensure that the routes to the primary, secondary, and tertiary controllers allow IP packet fragments.

Step 2 Ensure that your controller is connected to a switch trunk port.

Step 3 Configure the controller in LWAPP Layer 3 mode and ensure its DS Port is connected to the switch. Use the CLI, web-browser interface, or Cisco WCS procedures as described in the appropriate controller guide.

a.In multi-controller environments, You can set one controller’s DS port to Master (you can use the config network master-base disable CLI command or you can use the controller GUI) so that new lightweight access points always associate with it. You can use the show network config CLI command to determine if the controller DS port is the master.

All lightweight access points associate to the master controller. From one location, you can configure lightweight access point settings such as primary, secondary, and tertiary controllers. This allows you to redistribute your lightweight access points to other controllers on the network.

You can also use a Cisco WCS server to control, configure, and redistribute all your lightweight access points from a single location.

Step 4 Apply power to the access points:

a.Connect your lightweight access points to untagged access ports on your POE capable switch. You can optionally use power modules or power injectors to power your access points.

b.After you power up the lightweight access point, it begins a power-up sequence that you can check by observing the access point LEDs. All LEDs blink sequentially back and forth, indicating that the access point is trying to find a controller.

Note If the access point remains in this mode for more than 5 minutes, the access point is unable to find the master controller. Check the connection between the access point and the controller and ensure they are on the same subnet.

c.If the lightweight access point shuts down (all LEDs off), check to ensure that sufficient power is available.

d.When the lightweight access point associates with the controller, if the access point code version differs from the controller code version, the access point downloads the operating system code from the controller. All the access point LEDs blink simultaneously during the download.

Cisco Aironet 1100 Series Access Point Hardware Installation Guide

 

E-2

OL-4309-07

 

 

 

Image 102
Contents Corporate Headquarters Page N T E N T S Deploying the Access Points on the Wireless Network Finding the Software Version Chinese Translation B-7 Purpose PrefaceAudience OrganizationConventions ViiiPreface Conventions Related Publications Obtaining DocumentationCisco.com Documentation FeedbackCisco Product Security Overview Product Documentation DVD Ordering DocumentationReporting Security Problems in Cisco Products Product Alerts and Field NoticesObtaining Technical Assistance Cisco Support WebsiteLocating the Product Serial Number Submitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information Xvi Overview Autonomous Access PointsLightweight Access Points Product TerminologyOverview Hardware Features Single Radio OperationEthernet Port Power Sources LEDsNetwork Examples with Autonomous Access Points Anti-Theft FeaturesUL 2043 Certification Root Unit on a Wired LAN Access pointRepeater Unit that Extends Wireless Range Access Point as RepeaterCentral Unit in an All-Wireless Network Workgroup Bridge ConfigurationNetwork Example with Lightweight Access Points Typical Layer 3 Network Configuration ExampleOL-4309-07 Installing the Access Point Safety Information FCC Safety Compliance StatementGeneral Safety Guidelines Unpacking the Access Point Basic Installation GuidelinesPackage Contents Access Point Layout and Connectors 1shows the access point layout and connectorsDeploying the Access Points on the Wireless Network Controller Discovery Process for Lightweight Access PointsOL-4309-07 Connecting the Ethernet and Power Cables Access Point Power OptionsConnecting to an Ethernet Network with Local Power Powering Up the Access Point OL-4309-07 Mounting Instructions Overview Mounting Method Materials Required KitMounting on a Horizontal or Vertical Surface Mounting BracketMounting on a Suspended Ceiling Suspended Ceiling Mounting Bracket PartsAccess Point Mounting Slots Mounting Above a Suspended Ceiling Remove a ceiling tile adjacent to the mounting locationUsing the Security Hasp Adapter Security Hasp AdapterMounting on a Cubical Wall Partition Security Hasp with PadlockUsing the Desktop Holster Cubicle Wall BracketDesktop Holster Using the Cable Lock Feature Kensington LockOL-4309-07 GHz Radio Upgrade for Autonomous Access Points Upgrade Overview Unpacking the RadioRemoving the Back Cover Go to the Removing a 2.4-GHz Radio sectionRemoving a 2.4-GHz Radio Radio Card and Antenna CardInstalling a 2.4-GHz Radio Connector pinsInserting Radio Card in Mini-PCI Connector Go to the Replacing the Back Cover section on Replacing the Back Cover Product compliance label Back coverFinding the Software Version OL-4309-07 Troubleshooting Autonomous Access Points Checking the Autonomous Access Point LEDs Ethernet Status RadioLED Checking Basic Settings Default IP Address BehaviorDefault Ssid and Radio Behavior Security Settings Enabling the Radio InterfacesWEP Keys Running the Carrier Busy Test Resetting to the Default Configuration Running the Ping or Link TestUsing the Mode Button Using the Web Browser InterfaceReloading the Access Point Image Web Browser Interface Browser Http InterfaceObtaining the Access Point Image File Obtaining the Tftp Server SoftwareOL-4309-07 Troubleshooting Lightweight Access Points Guidelines for Using 1100 Series Lightweight Access Points Using Dhcp OptionChecking the Lightweight Access Point LEDs Access Points LEDsMessage Ethernet Status Radio Type Returning the Access Point to Autonomous Mode Enabled see the Mode Button Setting section onObtaining the Autonomous Access Point Image File Mode Button SettingObtaining the Tftp Server Software OL-4309-07 Translated Safety Warnings OL-4309-07 Declarations of Conformity and Regulatory Information For Home or Office USE Vcci Statement for Japan Industry-Canada Canadian Compliance StatementOL-4309-07 EMC Declaration of Conformity for RF Exposure Japanese TranslationAll Access Points English TranslationOperation of Cisco Aironet Access Points in Brazil Access Point ModelsDeclaration of Conformity Statements Portuguese TranslationOL-4309-07 Page OL-4309-07 Page OL-4309-07 Access Point Specifications Category SpecificationsRadio GHz Radio To UL 2043 and they should not be placed in a building’s Category Specifications Channels and Maximum Power Levels OL-4309-07 Priming Lightweight Access Points Prior to Deployment OL-4309-07 Page Access Points Lightweight Access Point Vendor Class Identifier VCI Configuring Option 43 for 1000 Series Access Points Quotation marks must be includedType + Length + Value OL-4309-07 O S S a R Y GL-2 GL-3 GL-4 GL-5 GL-6 D E IN-2

CSACS1121K9 specifications

Cisco Systems CSACS1121K9 is a part of Cisco's comprehensive suite of security solutions tailored for identity and access management. This device, recognized for its reliability and functionality, plays a crucial role in ensuring that organizations can efficiently manage user access across their networks.

One of the main features of the CSACS1121K9 is its centralized user authentication capabilities. This device simplifies the process of validating user identities, allowing administrators to manage credentials for a variety of access methods, including web-based authentication, RADIUS, and TACACS+. This flexibility plays a significant role in diverse environments where different protocols may be required for various devices or applications.

The CSACS1121K9 is built on the robust Cisco Secure Access Control Server (ACS) platform. This platform supports a wide range of security policies, making it versatile enough for different organizational needs. With its capability to integrate seamlessly with other Cisco solutions and third-party platforms, the device enhances the overall security posture of an organization.

In terms of scalability, the CSACS1121K9 can support a substantial number of users and devices. This scalability ensures that as organizations grow, their access management system can scale proportionately without performance degradation. The ability to handle thousands of simultaneous authentication requests makes it suitable for both small companies and large enterprises.

Another significant characteristic of the CSACS1121K9 is its support for advanced visibility and reporting. Administrators can track authentication attempts, policy enforcement, and other critical events in real time. This level of monitoring is essential for compliance audits and helps organizations quickly react to potential security threats.

Moreover, the CSACS1121K9 includes capabilities for implementing role-based access control (RBAC). This feature allows organizations to define specific access rights based on user roles, which enhances security while facilitating efficient operations.

In conclusion, the Cisco Systems CSACS1121K9 is a powerful tool for organizations seeking to enhance their identity and access management frameworks. With its centralized user authentication, scalability, advanced reporting capabilities, and support for RBAC, it provides a robust solution that can adapt to the evolving security demands of modern networks. Whether deployed in a small business environment or within large enterprises, the CSACS1121K9 stands out for its comprehensive feature set and ability to integrate into existing security infrastructures.