{"id":1837,"date":"2022-12-19T23:37:20","date_gmt":"2022-12-19T22:37:20","guid":{"rendered":"https:\/\/www.klokocka.info\/?p=1837"},"modified":"2023-11-01T15:34:13","modified_gmt":"2023-11-01T14:34:13","slug":"cisco","status":"publish","type":"post","link":"https:\/\/www.klokocka.info\/?p=1837","title":{"rendered":"Cisco AIR-CAP2700 autonomous mode"},"content":{"rendered":"\n<p>This is how to configure Cisco AIR-CAP1702,  AIR-CAP2702 as autonomous (standalone) access point. This have to be done by using another firmware image which offers web-based GUI. <\/p>\n\n\n\n<p>What we need is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Console cable<\/strong> (one end with RJ-45 connector and the other end with RS232 serial port connector).<\/li>\n\n\n\n<li>Serial port on you PC<\/li>\n\n\n\n<li>Image file <strong>ap3g2-k9w7-tar.153-3.JH.tar<\/strong> &#8211; you can find <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/drive.google.com\/file\/d\/1LORJAC8yp9F4_nANquHw8awZeXlbt1Vx\/view\" target=\"_blank\">link<\/a><\/strong> in the description of <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=O2qNFVZ-KRQ&amp;ab_channel=ITSupportPeople\" target=\"_blank\">this<\/a><\/strong> video.<\/li>\n\n\n\n<li>Runing <strong>TFTP server<\/strong> on youtr PC with the image file shared. You can download TFTPD64 <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/pjo2.github.io\/tftpd64\/\" target=\"_blank\">here<\/a><\/strong>. And <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/techzain.com\/how-to-setup-tftp-server-tftpd64-tfptd32-windows\/\" target=\"_blank\">here<\/a><\/strong> is guide how to configure it, nothing complicated.<\/li>\n\n\n\n<li>Some terminal emulator program, I prefer <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/osdn.net\/projects\/ttssh2\/releases\/\" target=\"_blank\">TeraTerm<\/a><\/strong><\/li>\n\n\n\n<li>AP connected to the same network as your computer<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"166\" height=\"159\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-41.png\" alt=\"\" class=\"wp-image-1923\"\/><figcaption class=\"wp-element-caption\">Console cable<\/figcaption><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"368\" height=\"532\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/2.TFTP-Server-option.jpg\" alt=\"\" class=\"wp-image-2140\" srcset=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/2.TFTP-Server-option.jpg 368w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/2.TFTP-Server-option-208x300.jpg 208w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/2.TFTP-Server-option-42x60.jpg 42w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/2.TFTP-Server-option-62x90.jpg 62w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><figcaption class=\"wp-element-caption\">TFTP settings<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"368\" height=\"532\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/3.Advanced-TFTP-Options.jpg\" alt=\"\" class=\"wp-image-2141\" srcset=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/3.Advanced-TFTP-Options.jpg 368w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/3.Advanced-TFTP-Options-208x300.jpg 208w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/3.Advanced-TFTP-Options-42x60.jpg 42w, https:\/\/www.klokocka.info\/wp-content\/uploads\/2023\/11\/3.Advanced-TFTP-Options-62x90.jpg 62w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><figcaption class=\"wp-element-caption\">TFTP settings<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>I tested this procedure on 1702 and 2702, but i&#8217;m pretty sure that, it works well for 1700, 2700 also, with the same image file. For 1600 model line you need firmware starting with <strong>ap1g2<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The procedure<\/h3>\n\n\n\n<p>Establish the serial connection between AP and your PC, if you power AP on, some text should appear in the console.<\/p>\n\n\n\n<p>Power AP off, <strong>press and hold<\/strong> MODE button, power AP on and wait for message: &#8220;<strong>button is pressed, wait for button to be released&#8230;<\/strong>&#8220;<\/p>\n\n\n\n<p>Release button and now router is in image recovery mode:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"742\" height=\"254\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-29.png\" alt=\"\" class=\"wp-image-1851\"\/><\/figure>\n\n\n\n<p>Press ENTER and type ap commands: <br>(lines marked with <strong>\/\/<\/strong> are my comments, do not type them)<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/Set ip address of acces point\nset IP_ADDR 10.40.1.133\nset NETMASK 255.255.255.0\nset DEFAULT_ROUTER 10.40.1.1\n\/\/Don't worry if you cannot ping it from PC\n\n\/\/Enable necessary functions\ntftp_init\nether_init\nflash_init<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"372\" height=\"122\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-30.png\" alt=\"\" class=\"wp-image-1852\"\/><\/figure>\n\n\n\n<p>Now we erase file system by command <strong>format flash:<\/strong> to have enough space for new image and for clearing old configuration. It takes about minute, wait for <strong>ap:<\/strong> to be displayed show.<br>(Before that, you can look at file system by command <strong>dir flash:<\/strong>)<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/Format file system\nformat flash:<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"581\" height=\"135\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-31.png\" alt=\"\" class=\"wp-image-1853\"\/><\/figure>\n\n\n\n<p>Next step is downloading and extracting image file shared on your TFTP server. You have to know IP address of your, computer (in my case its&#8217;s 10.40.1.130) where TFTP server is running (dont forget enable it in firewall or disable firewall). It takes about 10 minutes.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">tar -xtract tftp:\/\/10.40.1.130\/ap3g2-k9w7-tar.153-3.JH.tar flash:<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-32.png\" alt=\"\" class=\"wp-image-1854\" width=\"415\" height=\"277\"\/><figcaption class=\"wp-element-caption\">Extracting new image file to AP using serial console and TFTPd64 server app.<\/figcaption><\/figure>\n\n\n\n<p>Now you can lok at <em>flash:<\/em> file system using <strong>dir flash:<\/strong> command, set new boot image and finally reboot the device.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/Let's look at the file system\ndir flash:\n\/\/Set boot image\nset boot flash:\/ap3g2-k9w7-mx.153-3.JH\n\/\/View set parameters\nset\n\/\/reboot\nboot\n\n\/\/some models need boot setting command in this form:\n\/\/set boot flash:\/ap3g2-k9w7-mx.153-3.JH\/ap3g2-k9w7-mx.153-3.JH<\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-33.png\" alt=\"\" class=\"wp-image-1855\" width=\"457\" height=\"303\"\/><\/figure>\n<\/div>\n\n\n<p>After reboot and some time, you can see respone with current name of AP like this: <strong>NameOfAP&gt;<\/strong><\/p>\n\n\n\n<p>Now is possible to run commands to configure. You can always pres <strong>? <\/strong>to see available commands:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"494\" height=\"448\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-34.png\" alt=\"\" class=\"wp-image-1858\"\/><figcaption class=\"wp-element-caption\">Usin help <strong>? <\/strong>command<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Set IP Address and Hostname<\/h3>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/Unlock configuration commands (password is Cisco)\nenable\n\n\/\/Enter configuration mode and selecting network interface to configure\nconfigure terminal\n\/\/select interface\ninterface bvi1\n\/\/setting ip address of AP\nip address 10.40.1.133 255.255.255.0\nip default-gateway 10.40.1.1\n\/\/after this, it escapes from interface, so again...\ninterface bvi1\nno shutdown\n\/\/exit from interface\nexit\n\/\/setting new hostname (name of AP)\nhostname MyNewCiscoAP\n\/\/exit from configure mode\nexit\nwrite mmemory<\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"191\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-37.png\" alt=\"\" class=\"wp-image-1863\"\/><\/figure>\n<\/div>\n\n\n<p>You can check your configuration by command <strong>show ip interface brief<\/strong><\/p>\n\n\n\n<p> <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"100\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-38.png\" alt=\"\" class=\"wp-image-1864\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Set system time<\/h3>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/set the right clock and NTP servers\nshow clock\n\/\/clock set 12:32:00 21 december 2022 (optional manual setting of clock)\n\nconfigure terminal\nsntp server 195.113.144.201      \/\/tik.cesnet.cz\nsntp server 195.113.144.238      \/\/tak.cesnet.cz\nsntp server 217.197.91.176       \/\/0.pool.ntp.org\nsntp server 37.221.199.157       \/\/2.pool.ntp.org\nsntp broadcast client\nclock timezone Prague 1          \/\/ 1 means UTC+1\nexit\nshow clock\nshow sntp\n\/\/save settings\nwrite memory<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration GUI<\/h3>\n\n\n\n<p>Now you should be able to ping the AP and run web GUI at http:\/\/10.40.1.133 (your adress off course). The web GUI sometimes acting strange, if you are not sure whatt exactly is happening, refresh the page. <br>Sometimes you have to <strong>wait <\/strong> until forms are filled with data.<br><\/p>\n\n\n\n<p>Username and password is <strong>Cisco <\/strong>and <strong>Cisco<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-36.png\" alt=\"\" class=\"wp-image-1860\" width=\"585\" height=\"265\"\/><\/figure>\n<\/div>\n\n\n<p>As first step, from the top menu choose <strong>Network<\/strong> -&gt; (on the left panel) <strong>Network interface -&gt; IP Address <\/strong>and set the <strong>Defult gateway<\/strong>:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.klokocka.info\/wp-content\/uploads\/2022\/12\/image-39.png\" alt=\"\" class=\"wp-image-1867\" width=\"650\" height=\"161\"\/><\/figure>\n<\/div>\n\n\n<p>You can also configure or disable IPv6 protocol at the same place.<\/p>\n\n\n\n<p>Now follow these steps to configure and enable radios with WPA encryption<\/p>\n\n\n\n<p><strong>Security <\/strong>-> <strong>Encryption Manager<\/strong> -> <strong>Encryption Modes<\/strong> part:<br> -> choose <strong>Cipher<\/strong> <br>-> select <strong>AES CCMP<\/strong> <br>-> click <strong>Aply All<\/strong> button<br><br><strong>Security<\/strong> -> <strong>SSID Manager<\/strong> -> <strong>SSID Properties<\/strong> part:<br>-> write <strong>SSID:<\/strong> (i.e. TestAP)<br>-> check desired radios (<strong>Radio0-802.11N 2.4GHz<\/strong> or <strong>Radio0-802.11AC GHz<\/strong> or both)<br>-> click <strong>Apply<\/strong> buttown (down)<br><br><strong>Security<\/strong> -> <strong>SSID Manager<\/strong>:<br><strong>SSID Properties<\/strong> part:<br>-> <strong>Current SSID List<\/strong> -> select your SSID (i.e. TestAP)<br><strong>Client Authenticated Key Management<\/strong> part:<br>-> <strong>Key Management <\/strong>-> select <strong>Mandatory<\/strong><br>-> check <strong>Enable WPA<\/strong> (or WPAv2 &#8211; sometimes it is not allowed)<br>-> <strong>WPA Pre-shared Key:<\/strong> -> write your password for SSID<br>-> click <strong>Apply<\/strong> buton within the curent part of page (there is another one down there)<br><br><strong>Network<\/strong> -> <strong>Network Interface<\/strong> -> <br>-> <strong>Radio0-802.11N 2.4GHz<\/strong> -> <strong>Settings<\/strong> (on top) -> <strong>Enable Radio:<\/strong> -> choose <strong>Enable<\/strong> -> click <strong>Apply<\/strong><br>(and the same for <strong>Radio0-802.11AC 5GHZ<\/strong> radio)<br><br><strong>Security<\/strong> -> <strong>SSID Manager<\/strong> -> <strong>Guest Mode\/Infrastructure SSID Settings<\/strong> part:<br>-> choose <strong>Single BSSID<\/strong> option<br>-> <strong>Set Single Guest Mode SSID:<\/strong> -> select yout AP name (i.e. TestAP)<br>(and the same for second radio)<br><br>And finaly click <strong>Save Configuration<\/strong> on the top right corner of the page<\/p>\n\n\n\n<p>Now the APs&#8217; SSID should be visible.<\/p>\n\n\n\n<p>Xou can also store your configuration to a text file via <strong>Software -&gt; System Configuration<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Links<\/h3>\n\n\n\n<p>Here is <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=O2qNFVZ-KRQ&amp;ab_channel=ITSupportPeople\" target=\"_blank\"><strong>video<\/strong><\/a> I followed for converting to autonomous mode<\/p>\n\n\n\n<p>Here is the <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=AwuWsGGofT4&amp;ab_channel=ITSupportPeople\" target=\"_blank\">video<\/a><\/strong> I followed when I was configuring AP via GUI. <\/p>\n\n\n\n<p>Cisco <a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/access_point\/15-3-3-JB\/configuration\/guide\/cg_book\/cg-chap2-gui.html\" target=\"_blank\">help<\/a> page and <a rel=\"noreferrer noopener\" href=\"https:\/\/content.cisco.com\/chapter.sjs?uri=\/searchable\/chapter\/www.cisco.com\/content\/en\/us\/td\/docs\/wireless\/access_point\/15_2_4_JB\/configuration\/guide\/scg15-2-4-Book\/scg15-2-4-preface.html.xml\" target=\"_blank\">other<\/a> help page<\/p>\n\n\n\n<p>Videoo with configuring IP &#8211; <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=SqhRj_3LS-c&amp;ab_channel=iNTELLIGENTTECHNOLOGYTRADE\" target=\"_blank\">setting IP<\/a><\/p>\n\n\n\n<p>Configure WPA2 via <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=JkUfTXuwj2U&amp;ab_channel=ITSupportPeople\" target=\"_blank\">command line<\/a> (video)<\/p>\n\n\n\n<p>Another cisco <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/access_point\/15-3-3\/configuration\/guide\/cg15-3-3\/cg15-3-3-chap6-radio.html\" target=\"_blank\" rel=\"noreferrer noopener\">help page<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Web GUI &#8220;404 not found&#8221; error workaround (not solved &#8211; just use command line configuration instead)<\/h3>\n\n\n\n<p>Configure WPA2 via <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=JkUfTXuwj2U&amp;ab_channel=ITSupportPeople\" target=\"_blank\">command line<\/a> (video)<\/p>\n\n\n\n<p>Some APs have broken web GUI &#8211; all Save\/Aply actions are unsuccessfull, followed by <strong>404 not found<\/strong> error. So it&#8217;s need to be configured via CLI.<\/p>\n\n\n\n<p>Following comads set manualy SSID, enable WPA authentication and enable both 2.4Ghz and 5GHz radios. Type only parts after <strong>#<\/strong> sign.<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/Setting SSID\nMyNewCiscoAP#configure terminal\nMyNewCiscoAP(config)#dot11 ssid YOUR_NEW_SSID\nMyNewCiscoAP(config-ssid)#authentication open\nMyNewCiscoAP(config-ssid)#authentication key-management wpa\nMyNewCiscoAP(config-ssid)#guest-mode\nMyNewCiscoAP(config-ssid)#wpa-psk ascii YOUR_WIFI_PASSWORD\n\n\/\/Enable 2G radio\nMyNewCiscoAP(config-ssid)#interface Dot11Radio0\nMyNewCiscoAP(config-if)#encryption mode ciphers aes-ccm\nMyNewCiscoAP(config-if)#ssid YOUR_NEW_SSID\nMyNewCiscoAP(config-if-ssid)#no shut\n\n\/\/Enable 5G radio\nMyNewCiscoAP(config-ssid)#interface Dot11Radio1\nMyNewCiscoAP(config-if)#encryption mode ciphers aes-ccm\nMyNewCiscoAP(config-if)#ssid YOUR_NEW_SSID\nMyNewCiscoAP(config-if-ssid)#no shut\n\n\/\/Save config\nMyNewCiscoAP(config-if-ssid)#exit\nMyNewCiscoAP(config-if)exit\nMyNewCiscoAP#write memory\n\n\/\/reboot\nMyNewCiscoAP#reload\n<\/pre>\n\n\n\n<p>Here is the source (for note only):<\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">\/\/here is the source\n\/\/https:\/\/www.hjgode.de\/wp\/2015\/11\/10\/how-to-enable-wpa2-psk-aes-on-cisco-ap1231g\/\n---------------------------------\nThe normal documented way to enable WPA2-PSK is:\n\nconfigure terminal\ndot11 ssid &lt;SSID_NAME>\nauthentication open\nauthentication key-management wpa version 2\nguest-mode\nwpa-psk ascii &lt;SSID_PASSWORD>\n!\ninterface Dot11Radio0\nencryption mode ciphers aes-ccm\nssid &lt;SSID_NAME>\nno shutdown\n!\nEvery time I got an error entering this line:\n\nAP1(config-ssid)#authentication key-management wpa version 2\n                                                    ^ \n% Invalid input detected at '^' marker.\nThe trick is to ignore the \u201cversion 2\u201d. The software will automatically use WPA2 when you enter \u201caes-ccm\u201d as the encryption mode cipher. So instead of the above use the following config commands:\n\nconfigure terminal\ndot11 ssid &lt;SSID_NAME>\nauthentication open\nauthentication key-management wpa\nguest-mode\nwpa-psk ascii &lt;SSID_PASSWORD>\n!\ninterface Dot11Radio0\nencryption mode ciphers aes-ccm\nssid &lt;SSID_NAME>\nno shutdown\n!\nThanks to Cisco not mentioning that in there standard documenation and thanks for one or two guys pointing that out in internet.<\/pre>\n\n\n\n<p>404 <a rel=\"noreferrer noopener\" href=\"https:\/\/community.cisco.com\/t5\/wireless\/web-gui-problem\/td-p\/3994382\/page\/2\" target=\"_blank\">discussion<\/a><br><\/p>\n\n\n\n<p>404 certificate <a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security-vpn\/public-key-infrastructure-pki\/215118-ios-self-signed-certificate-expiration-o.html#anc2\" target=\"_blank\">workaround<\/a><\/p>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">crypto key generate rsa general-keys\n\nAP# configure terminal\nAP(config)# hostname ap3600\nAP(config)# ip domain name company.com\nAP(config)# ip name-server 10.91.107.18\nAP(config)# ip http secure-server\nAP(config)# end\n<\/pre>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">3PO_AP#configure terminal\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#ip http server\n3PO_AP(config)#crypto pki server IOS-CA\n3PO_AP(cs-server)#grant auto\n3PO_AP(cs-server)#database level complete\n3PO_AP(cs-server)#o shut\n                  ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(cs-server)#no shut\n%Some server settings cannot be changed after CA certificate generation.\n% Please enter a passphrase to protect the private key\n% or type Return to exit\nPassword: \n\nRe-enter password: \n% Password do not match - Aborted\n\n3PO_AP(cs-server)#no shut                \n%Some server settings cannot be changed after CA certificate generation.\n% Please enter a passphrase to protect the private key\n% or type Return to exit\nPassword: \n\nRe-enter password: \n% Generating 1024 bit RSA keys, keys will be non-exportable...\n[OK] (elapsed time was 1 seconds)\n\n% Certificate Server enabled.\n3PO_AP(cs-server)#show crypto pki server IOS-CA Certificates\n                       ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(cs-server)#show crypto pki server IOS-CA Certificates\n                       ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(cs-server)#exit\n3PO_AP(config)#exit\n3PO_AP#show crypto pki server IOS-CA Certificates\nSerial Issued date              Expire date               Subject Name\n1       12:55:22 UTC Dec 21 2022 12:55:22 UTC Dec 20 2025  cn=IOS-CA\n\n3PO_AP#configure terminal\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#ip domain name strabag.cz\n3PO_AP(config)#ip name server 8.8.8.8\n                       ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(config)#ip name-server 8.8.8.8\n3PO_AP(config)#ip http secure-server\n3PO_AP(config)#end\n3PO_AP#show crypto pki server IOS-CA Certificates\nSerial Issued date              Expire date               Subject Name\n1       12:55:22 UTC Dec 21 2022 12:55:22 UTC Dec 20 2025  cn=IOS-CA\n\n3PO_AP#crypto pki authenticate \n                  ^\n% Invalid input detected at '^' marker.\n\n3PO_AP#config term\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#crypto pki authenticate \n% Incomplete command.\n\n3PO_AP(config)#crypto pki authenticate ?\n  WORD  CA Server Name\n\n3PO_AP(config)#crypto pki authenticate IOS-CA\n% Please delete your existing CA certificate first.\n% You must use 'no crypto pki trustpoint &lt;trustpoint-name>' to delete the CA certificate.\n3PO_AP(config)#crypto pki trustpoint TEST\n3PO_AP(ca-trustpoint)#enrollment url http:\/\/192.168.100.5:80       \n3PO_AP(ca-trustpoint)#subject-name CN=TEST\n3PO_AP(ca-trustpoint)#revocation-check none\n3PO_AP(ca-trustpoint)#rsakeypair TEST\n3PO_AP(ca-trustpoint)#exit\n3PO_AP(config)#crypto pki auth TEST\n3PO_AP(config)#crypto pki auth TEST\nCertificate has the following attributes:\n       Fingerprint MD5: 55E5D63C F583C887 78781D6A F9501CE7 \n      Fingerprint SHA1: 4E6D9099 4D45FAC3 B3175939 30EA4508 574F1422 \n\n% Do you accept this certificate? [yes\/no]: y\nTrustpoint CA certificate accepted.\n3PO_AP(config)#crypto pki enroll TEST\n%\n% Start certificate enrollment .. \n% Create a challenge password. You will need to verbally provide this\n   password to the CA Administrator in order to revoke your certificate.\n   For security reasons your password will not be saved in the configuration.\n   Please make a note of it.\n\nPassword: \nRe-enter password: \n\n% The subject name in the certificate will include: CN=TEST\n% The subject name in the certificate will include: 3PO_AP.strabag.cz\n% Include the router serial number in the subject name? [yes\/no]: yes\n% The serial number in the certificate will be: FCW1903N2B1\n% Include an IP address in the subject name? [no]: no\nRequest certificate from CA? [yes\/no]: yes\n% Certificate request sent to Certificate Authority\n% The 'show crypto pki certificate verbose TEST' commandwill show the fingerprint.\n\n3PO_AP(config)#show crypto pki certificate verbose TEST\n                 ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(config)#exit\n3PO_AP#show crypto pki certificate verbose TEST\nCertificate\n  Status: Available\n  Version: 3\n  Certificate Serial Number (hex): 02\n  Certificate Usage: General Purpose\n  Issuer: \n    cn=IOS-CA\n  Subject:\n    Name: 3PO_AP.strabag.cz\n    Serial Number: FCW1903N2B1\n    serialNumber=FCW1903N2B1+hostname=3PO_AP.strabag.cz\n    cn=TEST\n  Validity Date: \n    start date: 13:07:48 UTC Dec 21 2022\n    end   date: 13:07:48 UTC Dec 21 2023\n  Subject Key Info:\n    Public Key Algorithm: rsaEncryption\n    RSA Public Key: (512 bit)\n  Signature Algorithm: SHA1 with RSA Encryption\n  Fingerprint MD5: 75744E01 3CB87745 2B6B1EEE 3B910E56 \n  Fingerprint SHA1: 2D2E158C 0D4E0D3C 06BED720 96012CF9 CB9D736A \n  X509v3 extensions:\n    X509v3 Key Usage: A0000000\n      Digital Signature\n      Key Encipherment\n    X509v3 Subject Key ID: AD9F0B7F D975484D 8C57FD71 0EF14E31 F89D64BE \n\n    X509v3 Authority Key ID: 0A3B4200 022FE4F4 011DFAE6 DA39E288 9ACB50D2 \n    Authority Info Access:\n  Associated Trustpoints: TEST \n  Key Label: TEST\n\nCA Certificate\n  Status: Available\n  Version: 3\n  Certificate Serial Number (hex): 01\n  Certificate Usage: Signature\n  Issuer: \n    cn=IOS-CA\n  Subject: \n    cn=IOS-CA\n  Validity Date: \n    start date: 12:55:22 UTC Dec 21 2022\n    end   date: 12:55:22 UTC Dec 20 2025\n  Subject Key Info:\n    Public Key Algorithm: rsaEncryption\n    RSA Public Key: (1024 bit)\n  Signature Algorithm: MD5 with RSA Encryption\n  Fingerprint MD5: 55E5D63C F583C887 78781D6A F9501CE7 \n  Fingerprint SHA1: 4E6D9099 4D45FAC3 B3175939 30EA4508 574F1422 \n  X509v3 extensions:\n    X509v3 Key Usage: 86000000\n      Digital Signature\n      Key Cert Sign\n      CRL Signature\n    X509v3 Subject Key ID: 0A3B4200 022FE4F4 011DFAE6 DA39E288 9ACB50D2 \n    X509v3 Basic Constraints:\n        CA: TRUE\n\n    X509v3 Authority Key ID: 0A3B4200 022FE4F4 011DFAE6 DA39E288 9ACB50D2 \n    Authority Info Access:\n  Associated Trustpoints: TEST IOS-CA \n\n\n3PO_AP#write memory\nBuilding configuration...\n[OK]\n3PO_AP#cofig term\n         ^\n% Invalid input detected at '^' marker.\n\n3PO_AP#config term\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#ip domain name 192.168.100.5\n% IP: Bad domain name format - Configuring anyway\n3PO_AP(config)#ip http secure-server\n3PO_AP(config)#no shut\n                    ^\n% Invalid input detected at '^' marker.\n\n3PO_AP(config)#exit\n3PO_AP#show clock\n13:11:29.207 UTC Wed Dec 21 2022\n3PO_AP#clock timezone ?\n% Unrecognized command\n3PO_AP#configure term \nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#clock ?\n  initialize   Initialize system clock on restart\n  save         backup of clock with NVRAM\n  summer-time  Configure summer (daylight savings) time\n  timezone     Configure time zone\n\n3PO_AP(config)#clock timezone ?\n  WORD  name of time zone\n\n3PO_AP(config)#clock timezone prague\n% Incomplete command.\n\n3PO_AP(config)#clock timezone prague ?\n  &lt;-23 - 23>  Hours offset from UTC\n\n3PO_AP(config)#clock timezone prague 1\n3PO_AP(config)#clock timezone praguggg\n% Incomplete command.\n\n3PO_AP(config)#clock timezone praguggg 1\n%Time zone name is limited to 7 characters\n\n3PO_AP(config)#clock timezone sdg 1     \n3PO_AP(config)#clock timezone sdg 1\n3PO_AP#show clock    \n14:17:52.144 sdg Wed Dec 21 2022\n3PO_AP#config term\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#clock timezone Prague 1  \n3PO_AP(config)#exit\n3PO_AP#show clock\n14:18:24.639 Prague Wed Dec 21 2022\n3PO_AP#show clock ?\n  detail  Display detailed information\n  |       Output modifiers\n  &lt;cr>\n\n3PO_AP#show clock timezone\n                  ^\n% Invalid input detected at '^' marker.\n\n3PO_AP#show clock ?       \n  detail  Display detailed information\n  |       Output modifiers\n  &lt;cr>\n\n3PO_AP#show clock detail\n14:18:49.382 Prague Wed Dec 21 2022\nTime source is SNTP\n3PO_AP#config term\nEnter configuration commands, one per line.  End with CNTL\/Z.\n3PO_AP(config)#crypto key generate rsa general-keys\nThe name for the keys will be: 3PO_AP.192.168.100.5\nChoose the size of the key modulus in the range of 360 to 4096 for your\n  General Purpose Keys. Choosing a key modulus greater than 512 may take\n  a few minutes.\n\nHow many bits in the modulus [512]: 1024\n% Generating 1024 bit RSA keys, keys will be non-exportable...\n[OK] (elapsed time was 1 seconds)\n\n3PO_AP(config)#ca generate rsa key 1024\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>This is how to configure Cisco AIR-CAP1702, AIR-CAP2702 as autonomous (standalone) access point. This have to be done by using another firmware image which offers web-based GUI. What we need is: I tested this procedure on 1702 and 2702, but &hellip; <a href=\"https:\/\/www.klokocka.info\/?p=1837\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":1991,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"kt_blocks_editor_width":"","pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nezarazene"],"_links":{"self":[{"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1837"}],"version-history":[{"count":47,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/posts\/1837\/revisions"}],"predecessor-version":[{"id":2144,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/posts\/1837\/revisions\/2144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=\/wp\/v2\/media\/1991"}],"wp:attachment":[{"href":"https:\/\/www.klokocka.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klokocka.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}