Cisco Systems CSACS1121K9 manual Using the Mode Button, Using the Web Browser Interface

Page 66

Chapter 5 Troubleshooting Autonomous Access Points

Resetting to the Default Configuration

Using the MODE Button

Follow these steps to delete the current configuration and return all access point settings to the factory defaults using the MODE button:

Step 1 Disconnect power (the power jack for external power or the Ethernet cable for in-line power) from the access point.

Step 2 Press and hold the MODE button while you reconnect power to the access point.

Step 3 Hold the MODE button until the Status LED turns amber (approximately 2 to 3 seconds), and release the button.

Step 4 After the access point reboots, you must reconfigure the access point by using the Web browser interface, the Telnet interface, or Cisco IOS commands.

Note The access point is configured with the factory default values including the IP address (set to receive an IP address using DHCP).

Using the Web Browser Interface

Follow the steps below to delete the current configuration and return all access point settings to the factory defaults using the web browser interface.

Step 1 Open your web browser and enter the access point’s IP address in the browser address line. Press Enter. An Enter Network Password window appears.

Step 2 Enter the administrator username and password. The default username is Cisco and the default password is Cisco. The username and password are case sensitive. The Summary Status page appears.

Step 3 Click System Software and the System Software screen appears.

Step 4 Click System Configuration and the System Configuration screen appears.

Step 5 Click Default.

Note If the access point is configured with a static IP address, the IP address does not change.

Step 6 After the access point reboots, you must reconfigure the access point by using the Web browser interface, the Telnet interface, or Cisco IOS commands.

Cisco Aironet 1100 Series Access Point Hardware Installation Guide

5-8

OL-4309-07

 

 

Image 66
Contents Corporate Headquarters Page N T E N T S Deploying the Access Points on the Wireless Network Finding the Software Version Chinese Translation B-7 Purpose PrefaceAudience OrganizationConventions ViiiPreface Conventions Related Publications Obtaining DocumentationCisco.com Documentation FeedbackCisco Product Security Overview Product Documentation DVD Ordering DocumentationReporting Security Problems in Cisco Products Product Alerts and Field NoticesObtaining Technical Assistance Cisco Support WebsiteLocating the Product Serial Number Submitting a Service Request Definitions of Service Request SeverityObtaining Additional Publications and Information Xvi Overview Autonomous Access PointsLightweight Access Points Product TerminologyOverview Hardware Features Single Radio OperationEthernet Port Power Sources LEDsNetwork Examples with Autonomous Access Points Anti-Theft FeaturesUL 2043 Certification Root Unit on a Wired LAN Access pointRepeater Unit that Extends Wireless Range Access Point as RepeaterCentral Unit in an All-Wireless Network Workgroup Bridge ConfigurationNetwork Example with Lightweight Access Points Typical Layer 3 Network Configuration ExampleOL-4309-07 Installing the Access Point Safety Information FCC Safety Compliance StatementGeneral Safety Guidelines Unpacking the Access Point Basic Installation GuidelinesPackage Contents Access Point Layout and Connectors 1shows the access point layout and connectorsDeploying the Access Points on the Wireless Network Controller Discovery Process for Lightweight Access PointsOL-4309-07 Connecting the Ethernet and Power Cables Access Point Power OptionsConnecting to an Ethernet Network with Local Power Powering Up the Access Point OL-4309-07 Mounting Instructions Overview Mounting Method Materials Required KitMounting on a Horizontal or Vertical Surface Mounting BracketMounting on a Suspended Ceiling Suspended Ceiling Mounting Bracket PartsAccess Point Mounting Slots Mounting Above a Suspended Ceiling Remove a ceiling tile adjacent to the mounting locationUsing the Security Hasp Adapter Security Hasp AdapterMounting on a Cubical Wall Partition Security Hasp with PadlockUsing the Desktop Holster Cubicle Wall BracketDesktop Holster Using the Cable Lock Feature Kensington LockOL-4309-07 GHz Radio Upgrade for Autonomous Access Points Upgrade Overview Unpacking the RadioRemoving the Back Cover Go to the Removing a 2.4-GHz Radio sectionRemoving a 2.4-GHz Radio Radio Card and Antenna CardInstalling a 2.4-GHz Radio Connector pinsInserting Radio Card in Mini-PCI Connector Go to the Replacing the Back Cover section on Replacing the Back Cover Product compliance label Back coverFinding the Software Version OL-4309-07 Troubleshooting Autonomous Access Points Checking the Autonomous Access Point LEDs Ethernet Status RadioLED Checking Basic Settings Default IP Address BehaviorDefault Ssid and Radio Behavior Security Settings Enabling the Radio InterfacesWEP Keys Running the Carrier Busy Test Resetting to the Default Configuration Running the Ping or Link TestUsing the Mode Button Using the Web Browser InterfaceReloading the Access Point Image Web Browser Interface Browser Http InterfaceObtaining the Access Point Image File Obtaining the Tftp Server SoftwareOL-4309-07 Troubleshooting Lightweight Access Points Guidelines for Using 1100 Series Lightweight Access Points Using Dhcp OptionChecking the Lightweight Access Point LEDs Access Points LEDsMessage Ethernet Status Radio Type Returning the Access Point to Autonomous Mode Enabled see the Mode Button Setting section onObtaining the Autonomous Access Point Image File Mode Button SettingObtaining the Tftp Server Software OL-4309-07 Translated Safety Warnings OL-4309-07 Declarations of Conformity and Regulatory Information For Home or Office USE Vcci Statement for Japan Industry-Canada Canadian Compliance StatementOL-4309-07 EMC Declaration of Conformity for RF Exposure Japanese TranslationAll Access Points English TranslationOperation of Cisco Aironet Access Points in Brazil Access Point ModelsDeclaration of Conformity Statements Portuguese TranslationOL-4309-07 Page OL-4309-07 Page OL-4309-07 Access Point Specifications Category SpecificationsRadio GHz Radio To UL 2043 and they should not be placed in a building’s Category Specifications Channels and Maximum Power Levels OL-4309-07 Priming Lightweight Access Points Prior to Deployment OL-4309-07 Page Access Points Lightweight Access Point Vendor Class Identifier VCI Configuring Option 43 for 1000 Series Access Points Quotation marks must be includedType + Length + Value OL-4309-07 O S S a R Y GL-2 GL-3 GL-4 GL-5 GL-6 D E IN-2

CSACS1121K9 specifications

Cisco Systems CSACS1121K9 is a part of Cisco's comprehensive suite of security solutions tailored for identity and access management. This device, recognized for its reliability and functionality, plays a crucial role in ensuring that organizations can efficiently manage user access across their networks.

One of the main features of the CSACS1121K9 is its centralized user authentication capabilities. This device simplifies the process of validating user identities, allowing administrators to manage credentials for a variety of access methods, including web-based authentication, RADIUS, and TACACS+. This flexibility plays a significant role in diverse environments where different protocols may be required for various devices or applications.

The CSACS1121K9 is built on the robust Cisco Secure Access Control Server (ACS) platform. This platform supports a wide range of security policies, making it versatile enough for different organizational needs. With its capability to integrate seamlessly with other Cisco solutions and third-party platforms, the device enhances the overall security posture of an organization.

In terms of scalability, the CSACS1121K9 can support a substantial number of users and devices. This scalability ensures that as organizations grow, their access management system can scale proportionately without performance degradation. The ability to handle thousands of simultaneous authentication requests makes it suitable for both small companies and large enterprises.

Another significant characteristic of the CSACS1121K9 is its support for advanced visibility and reporting. Administrators can track authentication attempts, policy enforcement, and other critical events in real time. This level of monitoring is essential for compliance audits and helps organizations quickly react to potential security threats.

Moreover, the CSACS1121K9 includes capabilities for implementing role-based access control (RBAC). This feature allows organizations to define specific access rights based on user roles, which enhances security while facilitating efficient operations.

In conclusion, the Cisco Systems CSACS1121K9 is a powerful tool for organizations seeking to enhance their identity and access management frameworks. With its centralized user authentication, scalability, advanced reporting capabilities, and support for RBAC, it provides a robust solution that can adapt to the evolving security demands of modern networks. Whether deployed in a small business environment or within large enterprises, the CSACS1121K9 stands out for its comprehensive feature set and ability to integrate into existing security infrastructures.