4-12
Cisco 880 Series Integrated Services Router Software Configuration Guide
OL-22206-01
Chapter 4 Basic Wireless Device Configuration
Related Documentation

Recovering Software on the Access Point

To recover the image on the access point, use the service-module wlan-ap0 reset bootloader command
in global configuration mo de. This command returns the access point to the bootloader for manual image
recovery.
Caution Use this command with caution. It does not provide an orderly shutdown and consequently
may impact file operations that are in progress. Use this command only to recover from a
shutdown or a failed state.

Related Documentation

Refer to the following documentation for additional autonomous and unified configuration procedures:
Autonomous Cisco DocumentationTable 4-2
Cisco Unified DocumentationTable 4-3
Table 4-2 Autonomous Cisco Documentation
Network Design Links
Wireless Overview Chapter 2, “Wireless Device Overview”
Security Links
Authentication Types for Wireless Devices This document describes the authentication types that are configured on the
access point.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityAuthenticationTypes.html
RADIUS and TACACS+ Servers in a
Wireless Environment This document describes how to enable and configure the RADIUS and
TACACS+ and provides detailed accounting information and flexible
administrative control over authentication and authorization processes.
RADIUS and TACACS+ are facilitated through AAA1 and can be enabled
only through AAA commands.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityRadiusTacacs_1.html
Using the Access Point as a Local
Authenticator This document descri bes how to use a w ireless device in the role of an access
point as a local authenticator, serving as a standalone authenticator for a small
wireless LAN, or providing backup authentication service. As a local
authenticator, the access point performs LEAP, EAP-FAST, and MAC-based
authentication for up to 50 client devices.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityLocalAuthent.html
Cipher Suites and WEP This document describes how to co nfigure the cipher suites required for using
WPA and CCKM2; WEP; and WEP features including AES3, MIC4, TKIP,
and broadcast key rotation.
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/Se
curityCipherSuitesWEP.html