<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JDO2010</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=JDO2010"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/JDO2010"/>
	<updated>2026-04-20T07:15:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=4446</id>
		<title>Franske CNT-2612</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=4446"/>
		<updated>2011-05-08T21:23:15Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2612: CCNP 1 Network Switching classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2612 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2612 SP11 Schedule|Spring 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2612 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [http://wiki.ihcnt.net/w/IOS_vs._CatOS:_Basic_Configuration IOS vs. CatOS: Basic Configuration]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/AAA_with_802.1x_and_port_based_authentication AAA with 802.1x and Port-based Authentication]&lt;br /&gt;
* [[IPv6 Tunnel]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=4445</id>
		<title>Franske CNT-2612</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2612&amp;diff=4445"/>
		<updated>2011-05-08T21:22:54Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2612: CCNP 1 Network Switching classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2612 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2612 SP11 Schedule|Spring 2011 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2612 Labs and Homework|Lab and Homework List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* Assessments and online curriculum available at [http://cisco.netacad.net http://cisco.netacad.net]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [http://wiki.ihcnt.net/w/IOS_vs._CatOS:_Basic_Configuration IOS vs. CatOS: Basic Configuration]&lt;br /&gt;
* [http://wiki.ihcnt.net/w/AAA_with_802.1x_and_port_based_authentication AAA with 802.1x and Port-based Authentication]&lt;br /&gt;
* [[IPv6_Tunnel]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4444</id>
		<title>IPv6 Tunnel</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4444"/>
		<updated>2011-05-08T21:22:03Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are many different ways to connect to an IPv6 network.  One of the more popular ways has been to setup an IPv6 tunnel.  I have listed a few methods to set one up.  Keep in mind that there are many more ways to connect to an IPv6 tunnel than the ones I have listed.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Terado&#039;&#039;&#039;&lt;br /&gt;
*** Go to hurricane electric&#039;s website ([http://www.tunnelbroker.net www.tunnelbroker.net]) and register a new account and create a new tunnel.&lt;br /&gt;
*** Click on the &amp;quot;Example Configurations&amp;quot; tab and select your version of Windows.&lt;br /&gt;
*** Copy and paste the commands into your command prompt. You might need to be running the command prompt as administrator.&lt;br /&gt;
** &#039;&#039;&#039;Gogo6&#039;&#039;&#039;&lt;br /&gt;
*** Sign up for a Freenet6 account at http://gogonet.gogo6.com/page/freenet6-ipv6-services.&lt;br /&gt;
*** Download the latest version of gogoCLIENT and install it.&lt;br /&gt;
*** Inside the utility, click on the &amp;quot;Advanced&amp;quot; tab and select &amp;quot;IPv6-in-UDP-IPv4 Tunnel (NAT Traversal)&amp;quot;. This will allow you to connect from almost anywhere.&lt;br /&gt;
*** Go back to the &amp;quot;Basic&amp;quot; tab and select &amp;quot;Connect Using the Following Credentials&amp;quot;&lt;br /&gt;
*** Enter in your user name and password.&lt;br /&gt;
*** Click connect and select &amp;quot;Save&amp;quot; if a window pops up.&lt;br /&gt;
* &#039;&#039;&#039;Cisco IOS&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Hurricane Electric&#039;&#039;&#039;&lt;br /&gt;
*** &#039;&#039;&#039;Example Configuration&#039;&#039;&#039;&lt;br /&gt;
**** configure terminal&lt;br /&gt;
**** interface Tunnel0&lt;br /&gt;
**** description Hurricane Electric IPv6 Tunnel Broker&lt;br /&gt;
**** no ip address&lt;br /&gt;
**** ipv6 enable&lt;br /&gt;
**** ipv6 address 2001:470:1f10:ec5::2/64&lt;br /&gt;
**** tunnel source 24.131.132.166&lt;br /&gt;
**** tunnel destination 209.51.181.2&lt;br /&gt;
**** tunnel mode ipv6ip&lt;br /&gt;
**** ipv6 route ::/0 Tunnel0&lt;br /&gt;
**** end&lt;br /&gt;
**** write&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4443</id>
		<title>IPv6 Tunnel</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4443"/>
		<updated>2011-05-08T21:20:54Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;There are many different ways to connect to an IPv6 network.  One of the more popular ways has been to setup an IPv6 tunnel.  I have listed a few methods to set one up.  Keep in mind that there are many more ways to connect to an IPv6 tunnel than the ones I have listed.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Terado&#039;&#039;&#039;&lt;br /&gt;
*** Go to hurricane electric&#039;s website ([http://www.tunnelbroker.net www.tunnelbroker.net]) and register a new account and create a new tunnel.&lt;br /&gt;
*** Click on the &amp;quot;Example Configurations&amp;quot; tab and select your version of Windows.&lt;br /&gt;
*** Copy and paste the commands into your command prompt. You might need to be running the command prompt as administrator.&lt;br /&gt;
** &#039;&#039;&#039;Gogo6&#039;&#039;&#039;&lt;br /&gt;
*** Sign up for a Freenet6 account at [http://gogonet.gogo6.com/page/freenet6-ipv6-services].&lt;br /&gt;
*** Download the latest version of gogoCLIENT and install it.&lt;br /&gt;
*** Inside the utility, click on the &amp;quot;Advanced&amp;quot; tab and select &amp;quot;IPv6-in-UDP-IPv4 Tunnel (NAT Traversal)&amp;quot;. This will allow you to connect from almost anywhere.&lt;br /&gt;
*** Go back to the &amp;quot;Basic&amp;quot; tab and select &amp;quot;Connect Using the Following Credentials&amp;quot;&lt;br /&gt;
*** Enter in your user name and password.&lt;br /&gt;
*** Click connect and select &amp;quot;Save&amp;quot; if a window pops up.&lt;br /&gt;
* &#039;&#039;&#039;Cisco IOS&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Hurricane Electric&#039;&#039;&#039;&lt;br /&gt;
*** &#039;&#039;&#039;Example Configuration&#039;&#039;&#039;&lt;br /&gt;
**** configure terminal&lt;br /&gt;
**** interface Tunnel0&lt;br /&gt;
**** description Hurricane Electric IPv6 Tunnel Broker&lt;br /&gt;
**** no ip address&lt;br /&gt;
**** ipv6 enable&lt;br /&gt;
**** ipv6 address 2001:470:1f10:ec5::2/64&lt;br /&gt;
**** tunnel source 24.131.132.166&lt;br /&gt;
**** tunnel destination 209.51.181.2&lt;br /&gt;
**** tunnel mode ipv6ip&lt;br /&gt;
**** ipv6 route ::/0 Tunnel0&lt;br /&gt;
**** end&lt;br /&gt;
**** write&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4441</id>
		<title>IPv6 Tunnel</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=IPv6_Tunnel&amp;diff=4441"/>
		<updated>2011-05-08T21:16:55Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: Created page with &amp;quot;* &amp;#039;&amp;#039;&amp;#039;Windows&amp;#039;&amp;#039;&amp;#039; ** &amp;#039;&amp;#039;&amp;#039;Terado&amp;#039;&amp;#039;&amp;#039; *** Go to hurricane electric&amp;#039;s website ([http://www.tunnelbroker.net www.tunnelbroker.net]) and register a new account and create a new tunnel. **...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* &#039;&#039;&#039;Windows&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Terado&#039;&#039;&#039;&lt;br /&gt;
*** Go to hurricane electric&#039;s website ([http://www.tunnelbroker.net www.tunnelbroker.net]) and register a new account and create a new tunnel.&lt;br /&gt;
*** Click on the &amp;quot;Example Configurations&amp;quot; tab and select your version of Windows.&lt;br /&gt;
*** Copy and paste the commands into your command prompt. You might need to be running the command prompt as administrator.&lt;br /&gt;
** &#039;&#039;&#039;Gogo6&#039;&#039;&#039;&lt;br /&gt;
*** Sign up for a Freenet6 account at http://gogonet.gogo6.com/page/freenet6-ipv6-services.&lt;br /&gt;
*** Download the latest version of gogoCLIENT and install it.&lt;br /&gt;
*** Inside the utility, click on the &amp;quot;Advanced&amp;quot; tab and select &amp;quot;IPv6-in-UDP-IPv4 Tunnel (NAT Traversal)&amp;quot;. This will allow you to connect from almost anywhere.&lt;br /&gt;
*** Go back to the &amp;quot;Basic&amp;quot; tab and select &amp;quot;Connect Using the Following Credentials&amp;quot;&lt;br /&gt;
*** Enter in your user name and password.&lt;br /&gt;
*** Click connect and select &amp;quot;Save&amp;quot; if a window pops up.&lt;br /&gt;
* &#039;&#039;&#039;Cisco IOS&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;Hurricane Electric&#039;&#039;&#039;&lt;br /&gt;
*** &#039;&#039;&#039;Example Configuration&#039;&#039;&#039;&lt;br /&gt;
**** configure terminal&lt;br /&gt;
**** interface Tunnel0&lt;br /&gt;
**** description Hurricane Electric IPv6 Tunnel Broker&lt;br /&gt;
**** no ip address&lt;br /&gt;
**** ipv6 enable&lt;br /&gt;
**** ipv6 address 2001:470:1f10:ec5::2/64&lt;br /&gt;
**** tunnel source 24.131.132.166&lt;br /&gt;
**** tunnel destination 209.51.181.2&lt;br /&gt;
**** tunnel mode ipv6ip&lt;br /&gt;
**** ipv6 route ::/0 Tunnel0&lt;br /&gt;
**** end&lt;br /&gt;
**** write&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3893</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3893"/>
		<updated>2010-12-15T21:57:26Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
=== Major Linux Distributions ===&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
=== Online Linux Tutuorials ===&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3892</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=3892"/>
		<updated>2010-12-15T21:56:54Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux_command_guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
=== Major Linux Distributions ===&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
=== Online Linux Tutuorials ===&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2831&amp;diff=3861</id>
		<title>Franske CNT-2831</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2831&amp;diff=3861"/>
		<updated>2010-12-13T18:46:21Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2831: Implementing Cisco IOS Network Security (CCNA Security) classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2831 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2831 FA10 Schedule|Fall 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2831 Labs|Lab Assignments]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [[CCP Setup Instructions]]&lt;br /&gt;
* [[SmallBusinessSecurity]]&lt;br /&gt;
* [[DynDns]]&lt;br /&gt;
* [[Steganography]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3838</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3838"/>
		<updated>2010-12-13T01:17:51Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Micro Dots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed, or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Steghide&#039;&#039;&#039;&lt;br /&gt;
**An opensource program used on Linux and Windows systems to hide data in either an image or an audio file.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;For a complete list of stego tools please click on the following link:&#039;&#039;&#039;&lt;br /&gt;
**http://www.jjtc.com/Security/stegtools.htm&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
# Download JPHS for Windows at http://linux01.gwdg.de/~alatham/stego.html.&lt;br /&gt;
# Unzip it and run jphswin.exe.&lt;br /&gt;
# Agree to the End User Agreement&lt;br /&gt;
# Open the jpeg you want to use as the carrier image (the one that will hold the data) by clicking &amp;quot;Open jpeg&amp;quot; on the top toolbar.&lt;br /&gt;
# Click &amp;quot;Hide&amp;quot; on the top toolbar and put in a secret pass-phrase (remember the person you intend to receive the file also needs to know this key).&lt;br /&gt;
# Select the file you wish to hide and click ok.  If a message pops up warning you that your selected file is too large, either find a bigger carrier image or find a smaller file to hide.&lt;br /&gt;
# Click either &amp;quot;Save&amp;quot; or &amp;quot;Save as&amp;quot; on the top toolbar and you are done.&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
[[File:DSC_1604.jpg|200px|thumb|left|This picture has another picture file hidden in it.]]&lt;br /&gt;
#Download the full-resolution copy of this picture.&lt;br /&gt;
#Open JPHS for Windows.&lt;br /&gt;
#Open the downloaded image by clicking &amp;quot;Open jpeg&amp;quot;&lt;br /&gt;
#Click &amp;quot;Seek&amp;quot;&lt;br /&gt;
#When it asks you where to save the file, make sure to save it as a jpg.  Normally you would know in advance exactly what type of file the sender is giving you.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3833</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3833"/>
		<updated>2010-12-12T22:09:33Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* How to get Data out of an Image */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Steghide&#039;&#039;&#039;&lt;br /&gt;
**An opensource program used on Linux and Windows systems to hide data in either an image or an audio file.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;For a complete list of stego tools please click on the following link:&#039;&#039;&#039;&lt;br /&gt;
**http://www.jjtc.com/Security/stegtools.htm&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
# Download JPHS for Windows at http://linux01.gwdg.de/~alatham/stego.html.&lt;br /&gt;
# Unzip it and run jphswin.exe.&lt;br /&gt;
# Agree to the End User Agreement&lt;br /&gt;
# Open the jpeg you want to use as the carrier image (the one that will hold the data) by clicking &amp;quot;Open jpeg&amp;quot; on the top toolbar.&lt;br /&gt;
# Click &amp;quot;Hide&amp;quot; on the top toolbar and put in a secret pass-phrase (remember the person you intend to receive the file also needs to know this key).&lt;br /&gt;
# Select the file you wish to hide and click ok.  If a message pops up warning you that your selected file is too large, either find a bigger carrier image or find a smaller file to hide.&lt;br /&gt;
# Click either &amp;quot;Save&amp;quot; or &amp;quot;Save as&amp;quot; on the top toolbar and you are done.&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
[[File:DSC_1604.jpg|200px|thumb|left|This picture has another picture file hidden in it.]]&lt;br /&gt;
#Download the full-resolution copy of this picture.&lt;br /&gt;
#Open JPHS for Windows.&lt;br /&gt;
#Open the downloaded image by clicking &amp;quot;Open jpeg&amp;quot;&lt;br /&gt;
#Click &amp;quot;Seek&amp;quot;&lt;br /&gt;
#When it asks you where to save the file, make sure to save it as a jpg.  Normally you would know in advance exactly what type of file the sender is giving you.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:DSC_1604.jpg&amp;diff=3832</id>
		<title>File:DSC 1604.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:DSC_1604.jpg&amp;diff=3832"/>
		<updated>2010-12-12T21:53:35Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: Has a hidden file in it.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Has a hidden file in it.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3830</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3830"/>
		<updated>2010-12-12T21:49:25Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Steghide&#039;&#039;&#039;&lt;br /&gt;
**An opensource program used on Linux and Windows systems to hide data in either an image or an audio file.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;For a complete list of stego tools please click on the following link:&#039;&#039;&#039;&lt;br /&gt;
**http://www.jjtc.com/Security/stegtools.htm&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
# Download JPHS for Windows at http://linux01.gwdg.de/~alatham/stego.html.&lt;br /&gt;
# Unzip it and run jphswin.exe.&lt;br /&gt;
# Agree to the End User Agreement&lt;br /&gt;
# Open the jpeg you want to use as the carrier image (the one that will hold the data) by clicking &amp;quot;Open jpeg&amp;quot; on the top toolbar.&lt;br /&gt;
# Click &amp;quot;Hide&amp;quot; on the top toolbar and put in a secret pass-phrase (remember the person you intend to receive the file also needs to know this key).&lt;br /&gt;
# Select the file you wish to hide and click ok.  If a message pops up warning you that your selected file is too large, either find a bigger carrier image or find a smaller file to hide.&lt;br /&gt;
# Click either &amp;quot;Save&amp;quot; or &amp;quot;Save as&amp;quot; on the top toolbar and you are done.&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3822</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3822"/>
		<updated>2010-12-12T21:03:17Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Programs Associated with Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Steghide&#039;&#039;&#039;&lt;br /&gt;
**An opensource program used on Linux and Windows systems to hide data in either an image or an audio file.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;For a complete list of stego tools please click on the following link:&#039;&#039;&#039;&lt;br /&gt;
**http://www.jjtc.com/Security/stegtools.htm&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3821</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3821"/>
		<updated>2010-12-12T21:02:36Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Programs Associated with Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Steghide&#039;&#039;&#039;&lt;br /&gt;
**An opensource program used on Linux and Windows systems to hide data in either an image or an audio file.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
*For a complete list of stego tools please click on the following link:&lt;br /&gt;
**http://www.jjtc.com/Security/stegtools.htm&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3820</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3820"/>
		<updated>2010-12-12T20:49:02Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
*Steghide&lt;br /&gt;
**An opensource program used on Linux systems to hide data in an image.  Command-line only.&lt;br /&gt;
**http://steghide.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3819</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3819"/>
		<updated>2010-12-12T20:40:09Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Hiding Data in an Image */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.  When someone wants to hide something in an image, they use a program specifically designed to do it.  The program typically changes insignificant pixels in the image that are relatively unnoticeable by most people.  It also helps if the image you use is original.  If you go online and get an image, modify it, and hide something in it, a person using some software could easily find the differences between the two.  Encrypting the data before you hide it would also be a good idea just in case it is ever found out that there is data hidden in the image.&lt;br /&gt;
&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3692</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3692"/>
		<updated>2010-12-09T16:39:45Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Hiding Data in an Image */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hiding Data in an Image===&lt;br /&gt;
&lt;br /&gt;
Hiding data in images is probably the most prevalent form of Steganography used today.  It is rumored that terrorist organizations use this technique to spread information to its members.&lt;br /&gt;
&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3689</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3689"/>
		<updated>2010-12-09T16:26:03Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Null Ciphers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
Null Ciphers are even probably one of the simpler forms of steganography.  All it requires is a pre-shared key that both the sender and receiver know.  Here is an example of a null cipher:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;PRESIDENT&#039;S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE&lt;br /&gt;
SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN&lt;br /&gt;
OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT&lt;br /&gt;
IMMENSELY.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Take the first letter of each letter of each word and you get PERSHINGSAILSFROMNYJUNEI which is PERSHING SAILS FROM NY JUNE I after you apply spaces.&lt;br /&gt;
&lt;br /&gt;
===Hidden Text Within Webpages===&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3685</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3685"/>
		<updated>2010-12-09T16:12:28Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Micro Dots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.  Sizes of the various types of Micro Dots differ due to the wide variety of applications.  Currently, they are being sprayed onto laptops and car parts to try and stop reselling of the equipment.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
===Hidden Text Within Webpages===&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3581</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3581"/>
		<updated>2010-12-07T22:17:42Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Micro Dots */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
Micro dots are used to shrink the physical size of a document or image.  This technique was used heavily during World War I and World War II.  A person wanting to send data secretly to another person would need to use something called a Micro Dot Camera to take a picture of thing they want to send.  Once they have the picture the Micro Dot would then either be applied to a document and mailed or just attached to a carrier pigeon.  Of course you would want to make sure the document has some information on it that someone could easily read, otherwise they might suspect you are trying to hide something from them.&lt;br /&gt;
&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
===Hidden Text Within Webpages===&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3580</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3580"/>
		<updated>2010-12-07T21:51:24Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Different Types of Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
There are many different types of Steganography.  However, they all share the same goal of hiding the presence of some particular piece of data.&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
===Hidden Text Within Webpages===&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3579</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3579"/>
		<updated>2010-12-07T21:44:17Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Different Types of Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
===Micro Dots===&lt;br /&gt;
===Null Ciphers===&lt;br /&gt;
===Hidden Text Within Webpages===&lt;br /&gt;
===Hiding Files in plain sight===&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3348</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3348"/>
		<updated>2010-10-05T21:21:30Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* What is Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [http://www.merriam-webster.com/dictionary/steganography Merriam-Webster] as the art or practice of concealing a message, image, or file.&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3347</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3347"/>
		<updated>2010-10-05T21:12:08Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* What is Steganography */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
Steganography is defined by [[Merriam-Webster|http://www.merriam-webster.com/dictionary/steganography]]&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3346</id>
		<title>Steganography</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Steganography&amp;diff=3346"/>
		<updated>2010-10-05T20:52:02Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: Created page with &amp;#039;==What is Steganography==   ==Different Types of Steganography==   ==Programs Associated with Steganography==   ==How to Hide Data in an Image==   ==How to get Data out of an Ima…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==What is Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Different Types of Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Programs Associated with Steganography==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to Hide Data in an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to get Data out of an Image==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How to run analysis on an image==&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=2167</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=2167"/>
		<updated>2010-05-14T03:57:32Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [http://spreadsheets.google.com/viewform?formkey=dFZwb1VFOXh2bTJfS0FuRV92ZnR6eHc6MA Student Sign-In for 1/19/2010]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Syllabus|Spring 2010 Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Schedule|Spring 2010 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2311 Lab Point Sheet|Lab/Homework Point Sheet]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT-2311 Network Simulation Project|Network Simulation Project]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting]]&lt;br /&gt;
&lt;br /&gt;
* [[Grub2]]&lt;br /&gt;
&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
&lt;br /&gt;
*[[Nat Masquerading and Firewall]]&lt;br /&gt;
&lt;br /&gt;
* [http://cnt.lextron.net/Control_Web_Access_With_Squid Control Web Access with SQUID]&lt;br /&gt;
&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
=== Major Linux Distributions ===&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
=== Online Linux Tutuorials ===&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]\&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2166</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2166"/>
		<updated>2010-05-14T03:56:45Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ZoneMinder is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.  Make sure to plug in a USB webcam or similar device before you continue.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
:*Use Aptitude to install ZoneMinder&lt;br /&gt;
:* sudo aptitude install zoneminder&lt;br /&gt;
:* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
=Configure ZoneMinder from the web interface=&lt;br /&gt;
# Find your IP address using the ifconfig command&lt;br /&gt;
# Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;br /&gt;
# Click on &amp;quot;Add New Monitor&amp;quot; [[File:ZM_console.png|400px|thumb|right|This is what the ZoneMinder console looks like after it has been configured.  Here, the camera name is &amp;quot;Downstairs&amp;quot;]]&lt;br /&gt;
# Fill in the Name, Source Type, and Function.  For now, just set the function to Monitor.&lt;br /&gt;
# Put in a Maximum FPS (frames per second).  If you don&#039;t know what to put just type 15&lt;br /&gt;
# Put the same value as Max FPS into the Alarm Max FPS field.&lt;br /&gt;
# Click on the source tab on the top of the window.&lt;br /&gt;
# You will have to find the Device Path of your specific camera.  Mine was /dev/video0.  You could look in your syslog to find this.&lt;br /&gt;
# You will also need to find the Device Format, Capture Palette, Capture Width, and Capture Hight from the cameras manufacturer.  &lt;br /&gt;
# Click &amp;quot;Save&amp;quot;&lt;br /&gt;
#* If everything is working you should see the camera monitor you just made in the list.  If you click on it you can view the camera as jpegs.&lt;br /&gt;
=Hardware=&lt;br /&gt;
You can use almost any USB webcam or if you want a real security camera please use [http://www.zoneminder.com/wiki/index.php/Hardware_Compatibility_List this list] to find compatible cameras and capture cards.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2008</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2008"/>
		<updated>2010-05-11T15:45:16Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ZoneMinder is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.  Make sure to plug in a USB webcam or similar device before you continue.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
:*Use Aptitude to install ZoneMinder&lt;br /&gt;
:* sudo aptitude install zoneminder&lt;br /&gt;
:* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
=Configure ZoneMinder from the web interface=&lt;br /&gt;
# Find your IP address using the ifconfig command&lt;br /&gt;
# Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;br /&gt;
# Click on &amp;quot;Add New Monitor&amp;quot; [[File:ZM_console.png|400px|thumb|right|This is what the ZoneMinder console looks like after it has been configured.  Here, the camera name is &amp;quot;Downstairs&amp;quot;]]&lt;br /&gt;
# Fill in the Name, Source Type, and Function.  For now, just set the function to Monitor.&lt;br /&gt;
# Put in a Maximum FPS (frames per second).  If you don&#039;t know what to put just type 15&lt;br /&gt;
# Put the same value as Max FPS into the Alarm Max FPS field.&lt;br /&gt;
# Click on the source tab on the top of the window.&lt;br /&gt;
# You will have to find the Device Path of your specific camera.  Mine was /dev/video0.  You could look in your syslog to find this.&lt;br /&gt;
# You will also need to find the Device Format, Capture Palette, Capture Width, and Capture Hight from the cameras manufacturer.  &lt;br /&gt;
# Click &amp;quot;Save&amp;quot;&lt;br /&gt;
#* If everything is working you should see the camera monitor you just made in the list.  If you click on it you can view the camera as jpegs.&lt;br /&gt;
=Set up Streaming Video=&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2007</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=2007"/>
		<updated>2010-05-11T15:38:12Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ZoneMinder is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.  Make sure to plug in a USB webcam or similar device before you continue.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
:*Use Aptitude to install ZoneMinder&lt;br /&gt;
:* sudo aptitude install zoneminder&lt;br /&gt;
:* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
=Configure ZoneMinder from the web interface=&lt;br /&gt;
# Find your IP address using the ifconfig command&lt;br /&gt;
# Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;br /&gt;
# Click on &amp;quot;Add New Monitor&amp;quot; [[File:ZM_console.png|400px|thumb|right|This is what the ZoneMinder console looks like after it has been configured.  Here, the camera name is &amp;quot;Downstairs&amp;quot;]]&lt;br /&gt;
# Fill in the Name, Source Type, and Function.  For now, just set the function to Monitor.&lt;br /&gt;
# Put in a Maximum FPS (frames per second).  If you don&#039;t know what to put just type 15&lt;br /&gt;
# Put the same value as Max FPS into the Alarm Max FPS field.&lt;br /&gt;
# Click on the source tab on the top of the window.&lt;br /&gt;
# You will have to find the Device Path of your specific camera.  Mine was /dev/video0.  You could look in your syslog to find this.&lt;br /&gt;
# You will also need to find the Device Format, Capture Palette, Capture Width, and Capture Hight from the cameras manufacturer.  &lt;br /&gt;
# Click &amp;quot;Save&amp;quot;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:ZM_console.png&amp;diff=2006</id>
		<title>File:ZM console.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:ZM_console.png&amp;diff=2006"/>
		<updated>2010-05-11T15:24:54Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: This is what the ZoneMinder console should look like.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is what the ZoneMinder console should look like.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1983</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1983"/>
		<updated>2010-05-11T02:29:00Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ZoneMinder is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
#Use Aptitude to install ZoneMinder&lt;br /&gt;
#* sudo aptitude install zoneminder&lt;br /&gt;
#* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
#Configure ZoneMinder from the web interface&lt;br /&gt;
#* Find your IP address using the ifconfig command&lt;br /&gt;
#* Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1982</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1982"/>
		<updated>2010-05-11T02:28:24Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ZoneMinder is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
#Use Aptitude to install Zone Alarm&lt;br /&gt;
#* sudo aptitude install zoneminder&lt;br /&gt;
#* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
#Configure ZoneMinder from the web interface&lt;br /&gt;
#* Find your IP address using the ifconfig command&lt;br /&gt;
#* Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1981</id>
		<title>Zoneminder</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Zoneminder&amp;diff=1981"/>
		<updated>2010-05-11T02:28:02Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: Created page with &amp;#039;Zone Alarm is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server. …&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Zone Alarm is a security camera program for Ubuntu.  With it you can use your server as a security camera DVR that you can view online and record to the hard disk of the server.&lt;br /&gt;
=Install Zoneminder=&lt;br /&gt;
#Use Aptitude to install Zone Alarm&lt;br /&gt;
#* sudo aptitude install zoneminder&lt;br /&gt;
#* Aptitude will ask you if you want to install a bunch of extra packages.  Make sure to say yes to that.&lt;br /&gt;
#Configure ZoneMinder from the web interface&lt;br /&gt;
#* Find your IP address using the ifconfig command&lt;br /&gt;
#* Go to a web browser and type &#039;&#039;ip-address&#039;&#039;/zm in the URL bar&lt;br /&gt;
#* You will then see the zoneminder console.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1942</id>
		<title>ISDN WAN Connections</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1942"/>
		<updated>2010-05-10T15:30:02Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Basic Rate Interface (BRI)=&lt;br /&gt;
This was set up in a lab enviroment using an Adtran Atlas 550 to simulate WAN connection.  This will document configuring an ISDN BRI connection with dial-on-demand routing (DDO), RIP routing over ISDN, and B channel aggragation.&lt;br /&gt;
&lt;br /&gt;
==Configuring BRI==&lt;br /&gt;
#Basic Router Configuration&lt;br /&gt;
#Configure the router to use the approiate ISDN switch types,&lt;br /&gt;
#*This configuration uses the basic-ni switch type.  To learn about the other switch type go to [http://www.cisco.com/en/US/docs/ios/11_3/debug/command/reference/disdn.html ISDN Switch Types]&lt;br /&gt;
#*Router(config)# &#039;&#039;&#039;isdn switch-type&#039;&#039;&#039; &#039;&#039;type&#039;&#039;&lt;br /&gt;
#Use Dialer List to identifiy intresting traffic&lt;br /&gt;
#*Router(config)# &#039;&#039;&#039;dialer-list&#039;&#039;&#039; &#039;&#039;dialer-group-number&#039;&#039; &#039;&#039;&#039;protocol&#039;&#039;&#039; &#039;&#039;protocol-name&#039;&#039; &#039;&#039;&#039;permit | deny | list&#039;&#039;&#039; &#039;&#039;access-list-numeber&#039;&#039;&lt;br /&gt;
#Configure BRI Interface with encapsulation and authentication settings&lt;br /&gt;
#*Router(config)# &#039;&#039;&#039;interface&#039;&#039;&#039; &#039;&#039;interface-number&#039;&#039;&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;ip address&#039;&#039;&#039; &#039;&#039;ip-address&#039;&#039; &#039;&#039;subnet-mask&#039;&#039;&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;encapsulation ppp&#039;&#039;&#039;&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;ppp authentication chap&#039;&#039;&#039;&lt;br /&gt;
#Congigure a service profile identifier (SPID)&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;isdn spid&#039;&#039;&#039; &#039;&#039;spid-number&#039;&#039; &#039;&#039;local-dial-number&#039;&#039;&lt;br /&gt;
#Set the Dialer Idle Timeout&lt;br /&gt;
#*The dialer idle timeout defualts to 120 seconds.  It may need to be changed to a lower value to avoid excesive call charges.&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;dialer idle-timeout&#039;&#039;&#039; &#039;&#039;seconds&#039;&#039;&lt;br /&gt;
#Associate the interface to the already created dialer-list&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;dialer-group&#039;&#039;&#039; &#039;&#039;dialer-group-number&#039;&#039;&lt;br /&gt;
#Configure the Dialer Map&lt;br /&gt;
#*The dialer map tells the interface what to do with interesting traffic&lt;br /&gt;
#*You do not need to enable broadcasts if your routing protocol does not need broadcast.&lt;br /&gt;
#*The dial string is the destination telephone number.&lt;br /&gt;
#*Router(config-if)# &#039;&#039;&#039;dialer map&#039;&#039;&#039; &#039;&#039;protocol&#039;&#039; &#039;&#039;next-hop-address&#039;&#039; &#039;&#039;&#039;name&#039;&#039;&#039; &#039;&#039;hostname&#039;&#039; &#039;&#039;&#039;[broadcast]&#039;&#039;&#039; &#039;&#039;dial-string&#039;&#039;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1941</id>
		<title>ISDN WAN Connections</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1941"/>
		<updated>2010-05-10T14:51:25Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Basic Rate Interface (BRI)=&lt;br /&gt;
This was set up in a lab enviroment using an Adtran Atlas 550 to simulate WAN connection.  This will document configuring an ISDN BRI connection with dial-on-demand routing (DDO), RIP routing over ISDN, and B channel aggragation.&lt;br /&gt;
&lt;br /&gt;
==Configuring BRI==&lt;br /&gt;
#Basic Router Configuration&lt;br /&gt;
#Configure the router to use the approiate ISDN switch types,&lt;br /&gt;
:*This configuration uses the basic-ni switch type.  To learn about the other switch type go to [http://www.cisco.com/en/US/docs/ios/11_3/debug/command/reference/disdn.html ISDN Switch Types]&lt;br /&gt;
:*Router(config)# &#039;&#039;&#039;isdn switch-type&#039;&#039;&#039; &#039;&#039;type&#039;&#039;&lt;br /&gt;
#Use Dialer List to identifiy intresting traffic&lt;br /&gt;
:*Router(config)# &#039;&#039;&#039;dialer-list&#039;&#039;&#039; &#039;&#039;dialer-group-number&#039;&#039; &#039;&#039;&#039;protocol&#039;&#039;&#039; &#039;&#039;protocol-name&#039;&#039; &#039;&#039;&#039;permit | deny | list&#039;&#039;&#039; &#039;&#039;access-list-numeber&#039;&#039;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1940</id>
		<title>ISDN WAN Connections</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ISDN_WAN_Connections&amp;diff=1940"/>
		<updated>2010-05-10T14:38:39Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: Created page with &amp;#039;=Basic Rate Interface (BRI)= This was set up in a lab enviroment using an Adtran Atlas 550 to simulate WAN connection.  This will document configuring an ISDN BRI connection with…&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Basic Rate Interface (BRI)=&lt;br /&gt;
This was set up in a lab enviroment using an Adtran Atlas 550 to simulate WAN connection.  This will document configuring an ISDN BRI connection with dial-on-demand routing (DDO), RIP routing over ISDN, and B channel aggragation.&lt;br /&gt;
&lt;br /&gt;
==Configuring BRI==&lt;br /&gt;
#Basic Router Configuration&lt;br /&gt;
#Configure the router to use the approiate ISDN switch type&lt;br /&gt;
This configuration uses the basic-ni switch type.  To learn about the other switch type go to [http://www.cisco.com/en/US/docs/ios/11_3/debug/command/reference/disdn.html ISDN Switch Types]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Main_Page&amp;diff=1356</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Main_Page&amp;diff=1356"/>
		<updated>2010-03-05T15:50:52Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Technical Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Welcome to the CNT Wiki&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To prevent spam on this wiki we require user account creation to create and edit pages.&lt;br /&gt;
&lt;br /&gt;
==Program Information==&lt;br /&gt;
* [[Open Lab Schedule Spring 2010|Open lab schedule]] for the current semester.&lt;br /&gt;
&lt;br /&gt;
== Course Information ==&lt;br /&gt;
=== Courses taught by [[User:BenFranske|Dr. Ben Franske]] ===&lt;br /&gt;
* [[Franske CNT-2300|CNT-2300]]&lt;br /&gt;
* [[Franske CNT-2311|CNT-2311]]&lt;br /&gt;
* [[Franske CNT-2510|CNT-2510]]&lt;br /&gt;
* [[Franske CNT-2520|CNT-2520]]&lt;br /&gt;
* [[Franske CNT-2530|CNT-2530]]&lt;br /&gt;
* [[Franske CNT-2540|CNT-2540]]&lt;br /&gt;
&lt;br /&gt;
== Technical Information ==&lt;br /&gt;
* [[Introduction to DOS]] - Work In Progress&lt;br /&gt;
* [[Router Documentation]]&lt;br /&gt;
* [[Switch Documentation]]&lt;br /&gt;
* [[VMWare Setup|Instructions for creating VMWare machines from the CNT template]]&lt;br /&gt;
* [[VirtualBox Startup Script|Instructions for creating a VirtualBox startup script to save VMs in specific location]]&lt;br /&gt;
* [[Vyatta|Using the Vyatta open source routing platform]]&lt;br /&gt;
* [[Networkingcables]]&lt;br /&gt;
* [[Cisco Wireless Access Points|How to configure Cisco 1200 and 1242 series access points]]&lt;br /&gt;
&lt;br /&gt;
== Software Resources ==&lt;br /&gt;
* [http://msdn08.e-academy.com/inverhills_CNT MSDN Academic Alliance] (Microsoft Software, requires IHCC login)&lt;br /&gt;
* [http://info.inverhills.edu/eacademy/eacademyvmware.asp VMware eAcademy] (VMware Software, requires IHCC login)&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Areonet_1200&amp;diff=1355</id>
		<title>Cisco Areonet 1200</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Areonet_1200&amp;diff=1355"/>
		<updated>2010-03-05T15:47:38Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: moved Cisco Areonet 1200 to Cisco Wireless Access Points&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Cisco Wireless Access Points]]&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1354</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1354"/>
		<updated>2010-03-05T15:47:38Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: moved Cisco Areonet 1200 to Cisco Wireless Access Points&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg|thumb|450px]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg|thumb|450px]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg|thumb|450px]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==Encryption Manager==&lt;br /&gt;
#Click on the &amp;quot;Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Click on &amp;quot;Encryption Manager&amp;quot; from the list that drops down below the Security tab.&lt;br /&gt;
#Make sure that &amp;quot;Cipher&amp;quot; is filled in.&lt;br /&gt;
#Select &amp;quot;AES CCMP + TKIP&amp;quot; from the dropdown menu.&lt;br /&gt;
#Click Apply-All at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#Click on &amp;quot;SSID Manager&amp;quot; right below the &amp;quot;Encryption Manager&amp;quot; tab.&lt;br /&gt;
#Select your SSID from the list.&lt;br /&gt;
#Make sure the correct radio interfaces are selected.&lt;br /&gt;
#Scroll down to &amp;quot;Client Authenticated Key Management&amp;quot;&lt;br /&gt;
#Under Key Management, select &amp;quot;Mandatory&amp;quot; from the dropdown list.&lt;br /&gt;
#Check the &amp;quot;Enable WPA&amp;quot; box and select &amp;quot;WPAv2&amp;quot; from the second dropdown menu.&lt;br /&gt;
#Under WPA pre-shared key, type in a strong password that users will use to connect to your network.&lt;br /&gt;
&lt;br /&gt;
==Turn on Radio Interface==&lt;br /&gt;
#Click on the &amp;quot;Network Interfaces&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Radio0-802.11G&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Settings&amp;quot; tab at the top of the page.&lt;br /&gt;
#Check the &amp;quot;Enable&amp;quot; circle.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1333</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1333"/>
		<updated>2010-03-05T15:05:05Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg|thumb|450px]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg|thumb|450px]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg|thumb|450px]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==Encryption Manager==&lt;br /&gt;
#Click on the &amp;quot;Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Click on &amp;quot;Encryption Manager&amp;quot; from the list that drops down below the Security tab.&lt;br /&gt;
#Make sure that &amp;quot;Cipher&amp;quot; is filled in.&lt;br /&gt;
#Select &amp;quot;AES CCMP + TKIP&amp;quot; from the dropdown menu.&lt;br /&gt;
#Click Apply-All at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#Click on &amp;quot;SSID Manager&amp;quot; right below the &amp;quot;Encryption Manager&amp;quot; tab.&lt;br /&gt;
#Select your SSID from the list.&lt;br /&gt;
#Make sure the correct radio interfaces are selected.&lt;br /&gt;
#Scroll down to &amp;quot;Client Authenticated Key Management&amp;quot;&lt;br /&gt;
#Under Key Management, select &amp;quot;Mandatory&amp;quot; from the dropdown list.&lt;br /&gt;
#Check the &amp;quot;Enable WPA&amp;quot; box and select &amp;quot;WPAv2&amp;quot; from the second dropdown menu.&lt;br /&gt;
#Under WPA pre-shared key, type in a strong password that users will use to connect to your network.&lt;br /&gt;
&lt;br /&gt;
==Turn on Radio Interface==&lt;br /&gt;
#Click on the &amp;quot;Network Interfaces&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Radio0-802.11G&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Settings&amp;quot; tab at the top of the page.&lt;br /&gt;
#Check the &amp;quot;Enable&amp;quot; circle.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1322</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1322"/>
		<updated>2010-03-05T14:56:06Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==Encryption Manager==&lt;br /&gt;
#Click on the &amp;quot;Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Click on &amp;quot;Encryption Manager&amp;quot; from the list that drops down below the Security tab.&lt;br /&gt;
#Make sure that &amp;quot;Cipher&amp;quot; is filled in.&lt;br /&gt;
#Select &amp;quot;AES CCMP + TKIP&amp;quot; from the dropdown menu.&lt;br /&gt;
#Click Apply-All at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#Click on &amp;quot;SSID Manager&amp;quot; right below the &amp;quot;Encryption Manager&amp;quot; tab.&lt;br /&gt;
#Select your SSID from the list.&lt;br /&gt;
#Make sure the correct radio interfaces are selected.&lt;br /&gt;
#Scroll down to &amp;quot;Client Authenticated Key Management&amp;quot;&lt;br /&gt;
#Under Key Management, select &amp;quot;Mandatory&amp;quot; from the dropdown list.&lt;br /&gt;
#Check the &amp;quot;Enable WPA&amp;quot; box and select &amp;quot;WPAv2&amp;quot; from the second dropdown menu.&lt;br /&gt;
#Under WPA pre-shared key, type in a strong password that users will use to connect to your network.&lt;br /&gt;
&lt;br /&gt;
==Turn on Radio Interface==&lt;br /&gt;
#Click on the &amp;quot;Network Interfaces&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Radio0-802.11G&amp;quot; tab.&lt;br /&gt;
#Click on the &amp;quot;Settings&amp;quot; tab at the top of the page.&lt;br /&gt;
#Check the &amp;quot;Enable&amp;quot; circle.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1317</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1317"/>
		<updated>2010-03-05T14:50:45Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==Encryption Manager==&lt;br /&gt;
#Click on the &amp;quot;Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Click on &amp;quot;Encryption Manager&amp;quot; from the list that drops down below the Security tab.&lt;br /&gt;
#Make sure that &amp;quot;Cipher&amp;quot; is filled in.&lt;br /&gt;
#Select &amp;quot;AES CCMP + TKIP&amp;quot; from the dropdown menu.&lt;br /&gt;
#Click Apply-All at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#Click on &amp;quot;SSID Manager&amp;quot; right below the &amp;quot;Encryption Manager&amp;quot; tab.&lt;br /&gt;
#Select your SSID from the list.&lt;br /&gt;
#Make sure the correct radio interfaces are selected.&lt;br /&gt;
#Scroll down to &amp;quot;Client Authenticated Key Management&amp;quot;&lt;br /&gt;
#Under Key Management, select &amp;quot;Mandatory&amp;quot; from the dropdown list.&lt;br /&gt;
#Check the &amp;quot;Enable WPA&amp;quot; box and select &amp;quot;WPAv2&amp;quot; from the second dropdown menu.&lt;br /&gt;
#Under WPA pre-shared key, type in a strong password that users will use to connect to your network.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1309</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1309"/>
		<updated>2010-03-05T14:43:10Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* SSID Manager */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==Encryption Manager==&lt;br /&gt;
#Click on the &amp;quot;Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Click on &amp;quot;Encryption Manager&amp;quot; from the list that drops down below the Security tab.&lt;br /&gt;
#Make sure that &amp;quot;Cipher&amp;quot; is filled in.&lt;br /&gt;
#Select &amp;quot;AES CCMP + TKIP&amp;quot; from the dropdown menu.&lt;br /&gt;
#Click Apply-All at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1305</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1305"/>
		<updated>2010-03-05T14:33:31Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: /* Express Setup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Security==&lt;br /&gt;
#Click on the &amp;quot;Express Security&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Type a name for your new wireless network in the SSID field.&lt;br /&gt;
#If you want client to be able to easily find your network, then make sure to check the &amp;quot;Broadcast SSID in Beacon&amp;quot; box.&lt;br /&gt;
#If your network is configured to use VLANs, then enter in the VLAN ID into the &amp;quot;Enable VLAN ID&amp;quot; field.&lt;br /&gt;
#Click Apply at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1278</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1278"/>
		<updated>2010-03-05T05:07:33Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
=Cisco 1242=&lt;br /&gt;
The process for setting up a Cisco 1242 series access point and pretty much the same as the 1200.  The main difference in the setup procedure is in the online interface.  I am starting off right after you have configured the BVI1 interface on your access point.&lt;br /&gt;
==Open Online Interface==&lt;br /&gt;
#Open a web browser (Internet Explorer, Firefox, Google Chrome, etc).&lt;br /&gt;
#In the URL bar, type 192.168.1.1&lt;br /&gt;
#Use &#039;&#039;&#039;admin&#039;&#039;&#039; for the username and &#039;&#039;&#039;Cisco&#039;&#039;&#039; as the password.&lt;br /&gt;
==Express Setup==&lt;br /&gt;
#Click on the &amp;quot;Express Setup&amp;quot; tab on the left side of the page.&lt;br /&gt;
#Put the name of your wireless network into the SSID field on the page.&lt;br /&gt;
#Scroll to the bottom and click Apply.&lt;br /&gt;
==SSID Manager==&lt;br /&gt;
#&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1277</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1277"/>
		<updated>2010-03-05T04:49:36Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article was written to set up a Cisco Aironet 1200 or 1242 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
[[File:hyperterminal.jpg]]&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
=Cisco Aironet 1200=&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
[[File:9.jpg]]&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
[[File:14.jpg]]&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:14.jpg&amp;diff=1276</id>
		<title>File:14.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:14.jpg&amp;diff=1276"/>
		<updated>2010-03-05T04:36:43Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:9.jpg&amp;diff=1275</id>
		<title>File:9.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:9.jpg&amp;diff=1275"/>
		<updated>2010-03-05T04:33:27Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=File:Hyperterminal.jpg&amp;diff=1274</id>
		<title>File:Hyperterminal.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=File:Hyperterminal.jpg&amp;diff=1274"/>
		<updated>2010-03-05T04:27:33Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1267</id>
		<title>Cisco Wireless Access Points</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Cisco_Wireless_Access_Points&amp;diff=1267"/>
		<updated>2010-03-04T19:31:18Z</updated>

		<summary type="html">&lt;p&gt;JDO2010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;Cisco Aironet 1200 Series Wireless Access Point: Basic Wireless Configuration&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This article was written to set up a Cisco Aironet 1200 series access point without connecting it to a wired network. These settings will enable basic wireless services including DHCP for wireless devices. The particular access point that was used to research and produce this article contained Cisco’s IOS operating system so much of the command line configuration is similar to that if Cisco’s switches and routers.&lt;br /&gt;
&lt;br /&gt;
==Plug in the access point==&lt;br /&gt;
==Create a physical connection to the access point.==&lt;br /&gt;
# This can be done with a rollover cable and a DB-9 to RJ45 adapter&lt;br /&gt;
# Connect the DB-9 to RJ45 adapter to the 9-pin DB-9 serial port on the back of the host PC&lt;br /&gt;
# Connect one end for the rollover cable to the RJ-45 console port located at the rear of the access point between the two antennas&lt;br /&gt;
# Connect the other end of the rollover cable to the RJ-45 connecter on the DB-9 to RJ45 adapter.&lt;br /&gt;
==Create an interface connection to the access point via HyperTerminal or other command line terminal==&lt;br /&gt;
# Open HyperTerminal from Start&amp;gt;All Programs&amp;gt;Accessories&amp;gt;Communications&lt;br /&gt;
# Create a new connection&lt;br /&gt;
## HyperTerminal should prompt you to create a new connection when it first opens&lt;br /&gt;
===Cisco recommends the following settings===&lt;br /&gt;
# 9600 baud rate&lt;br /&gt;
# 8 data bits&lt;br /&gt;
# no parity&lt;br /&gt;
# 1 stop bit&lt;br /&gt;
# no flow control&lt;br /&gt;
==Log in to the access point command line==&lt;br /&gt;
# Once the HyperTerminal connection is made, press &#039;&#039;&#039;Enter&#039;&#039;&#039; to access the command line interface and User Exec mode command prompt. None of the configuration we are doing will be in user EXEC mode so we will not spend any time on this area.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;enable&#039;&#039;&#039; and press enter. This is the command to enter the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, the system will prompt you for a password. The default password for this line of access points is &#039;&#039;&#039;Cisco&#039;&#039;&#039; and is case sensitive. This will also be the default password for the web browser interface in later sections. Type the password at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# This should result in a command prompt ending with the pound (#) character.&lt;br /&gt;
==Remove the old configuration file==&lt;br /&gt;
# To remove any old configurations and prevent old settings from interfering, remove the starting configuration file by issuing the command &#039;&#039;&#039;erase startup-config&#039;&#039;&#039; at the command prompt. &lt;br /&gt;
# At this point, the system will prompt you to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and return to the command prompt. &lt;br /&gt;
==Reload or restart the access point==&lt;br /&gt;
# At this point, you may either unplug the access point and plug it back in, or issue the command &#039;&#039;&#039;reload&#039;&#039;&#039; at the command prompt. If you choose to issue the &#039;&#039;&#039;reload&#039;&#039;&#039; command, it will prompt you again to confirm your actions. Press &#039;&#039;&#039;Enter&#039;&#039;&#039; to confirm and proceed with restarting the access point.&lt;br /&gt;
==Perform basic security configuration==&lt;br /&gt;
# Issue the command &#039;&#039;&#039;configure terminal&#039;&#039;&#039; at the command prompt and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This is known as “Global Configuration Mode”.&lt;br /&gt;
# If you wish, here you may issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;hostname &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;hostname&#039;&#039;&amp;gt; at the command prompt where &#039;&#039;hostname&#039;&#039; will be the name of the access point. For the purpose of this article, we left this as the default value of “ap”.&lt;br /&gt;
# You may also wish to change the default password with the command &#039;&#039;&#039;enable secret&#039;&#039;&#039;&amp;lt;nowiki&amp;gt; &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;password&amp;gt;&#039;&#039;. This will change the default password for the privileged EXEC mode. This will also change the default password to access the web browser interface.&lt;br /&gt;
==Configure the BVI1 interface with an IP address==&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;interface bvi 1&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to enter the interface configuration mode for the BVI1 interface. For the web browser interface to work, an IP address needs to be assigned to this interface. If you are configuring this on a wired network, this could be the network IP address of the access point. For our purposes, we configured this as a standalone access point and used the private address 192.168.1.1 with the subnet mask 255.255.255.0. Being as this address is in the subnet of the network that will occupy the access point, we then have the option use any device connected to the access point to access the web browser interface.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip address &#039;&#039;&#039;&#039;&#039;ip address subnet mask&#039;&#039;, where &#039;&#039;ip address&#039;&#039; &#039;&#039;subnet mask&#039;&#039; is the combination of IP address and subnet mask that you wish to use.&lt;br /&gt;
# At this point, you can issue the command &#039;&#039;&#039;no shutdown&#039;&#039;&#039; as you would during most cases of interface configuration, but, like loopback interfaces, the BVI1 interface is a virtual interface and is always up so this step is not necessary.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the global configuration command prompt.&lt;br /&gt;
==Configure the Dynamic Host Configuration Protocol (DHCP)==&lt;br /&gt;
# At this point we will configure the access point to provide DHCP service. To do this, choose a suitable network IP address and subnet mask to serve your purpose.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;&amp;lt;nowiki&amp;gt;ip dhcp excluded-address &amp;lt;&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;low address&amp;gt; &amp;lt;high address&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. The purpose of this command is to exclude a contiguous range of addresses used for management purposes such as static addresses for printers and other hardware and peripherals. You may enter a single address or a contiguous range of addresses.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;ip dhcp pool&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;name&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039;, where &#039;&#039;name&#039;&#039; is a name chosen to represent the IP address pool and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. For our purposes, we used the SSID of the access point. At this point, after pressing &#039;&#039;&#039;Enter&#039;&#039;&#039;, you are placed in DHCP configuration mode.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;network&#039;&#039;&#039; &#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; where &#039;&#039;&amp;lt;nowiki&amp;gt;ip address&amp;gt; &amp;lt;subnet mask&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; are the network IP address and subnet mask that you chose in step A. For our purposes, we stuck with the combination of 192.168.1.0 255.255.255.0.&lt;br /&gt;
# At the command prompt, issue the command &#039;&#039;&#039;lease &#039;&#039;&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;&amp;lt;days&amp;gt; &amp;lt;hours&amp;gt; &amp;lt;minutes&amp;gt;&amp;lt;/nowiki&amp;gt;&#039;&#039; to set the IP address lease period and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. You may use &#039;&#039;&#039;infinite&#039;&#039;&#039; instead of defining the days, hours and minutes.&lt;br /&gt;
# At the command prompt issue the command &#039;&#039;&#039;end&#039;&#039;&#039; and press &#039;&#039;&#039;Enter&#039;&#039;&#039; to return to the privileged EXEC mode prompt.&lt;br /&gt;
# At this point, DHCP has been configured and the web browser interface should be operational and accessible. At the command prompt, issue the command &#039;&#039;&#039;copy running-config startup-config&#039;&#039;&#039; to save the changes.&lt;br /&gt;
==Configure the host network interface card (NIC) IPv4 settings with an IP address==&lt;br /&gt;
# Configure the IPv4 settings of the PC network interface card so that it has a static IP address that is on the same subnet as the BVI1 interface as well as the same subnet mask. For our purposes, we used 192.168.1.2 255.255.255.0.&lt;br /&gt;
==Connect an Ethernet patch cable to the access point==&lt;br /&gt;
# Here, we are using a cabled connection because the SSID and wireless interfaces have not yet been configured. Using an Ethernet patch cable, plug one RJ-45 connector in the NIC on the PC and the other RJ-45 connector into the Fast Ethernet interface located at the rear of the access point between the two antennas.&lt;br /&gt;
==Connect to the web browser interface of the access point==&lt;br /&gt;
# Open a web browser such as Internet Explorer or Firefox.&lt;br /&gt;
# In the address bar, type &#039;&#039;&#039;http://&#039;&#039;&#039;&#039;&#039;ip address&#039;&#039; where &#039;&#039;ip address&#039;&#039; is the IP address of the BVI1 interface, and press &#039;&#039;&#039;Enter&#039;&#039;&#039;.&lt;br /&gt;
# At this point, you will receive a login prompt window. Leaving the username field blank, press the &#039;&#039;&#039;Tab&#039;&#039;&#039; key to move the cursor to the password field. If you set the password in step C of section VII, then the password you chose there is the same password needed here. If you left it as the default, the password should be &#039;&#039;&#039;Cisco&#039;&#039;&#039;. Enter the password and press &#039;&#039;&#039;Enter&#039;&#039;&#039;. This step should end with the web browser interface being displayed on the web browser.&lt;br /&gt;
==Configure service set identifier (SSID)==&lt;br /&gt;
# When the web browser interface starts, you are placed on the home screen. Here you should see a router configuration summary on the main screen. On the left side of the summary is a navigation panel. For our configuration we are going to navigate directly to the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page. We are doing this for two reasons. We need to configure an SSID for wireless devices to connect to and we need to enable the wireless interfaces which need the SSID to work.\&lt;br /&gt;
# On the top of the &#039;&#039;&#039;Express Security&#039;&#039;&#039; page, you will see a field for an SSID name and a check box to allow broadcasting of the SSID. Enter a name and check the box to enable SSID broadcast. There are a lot of other options on this page, but for our immediate purpose, these are the only changes we will make here. Once you have set the SSID name and allowed it to broadcast, scroll down to the bottom of the page and click &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
==Enable the wireless interfaces==&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Interfaces&#039;&#039;&#039; page in the navigation menu on the left side of the screen. You will notice that the navigation panel expands to show each of the individual interfaces.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Radio0-802.11B&#039;&#039;&#039; interface page. Here you will notice four tabs.&lt;br /&gt;
## RADIO0-802.11B STATUS - shows a summary interface status&lt;br /&gt;
## DETAILED STATUS - self explanatory&lt;br /&gt;
## SETTINGS - the changeable settings page&lt;br /&gt;
## CARRIER BUSY TEST - self explanatory&lt;br /&gt;
## Navigate directly to the &#039;&#039;&#039;Settings&#039;&#039;&#039; tab. Here you will notice all the settings available to configure the interface.&lt;br /&gt;
## For our purpose, click the &#039;&#039;&#039;enable&#039;&#039;&#039; option to enable the interface.&lt;br /&gt;
## Scroll down to the &#039;&#039;&#039;Data Rates&#039;&#039;&#039; setting and click on the &#039;&#039;&#039;Best Throughput&#039;&#039;&#039; button.&lt;br /&gt;
## Scroll sown to the bottom of the page and click the &#039;&#039;&#039;Apply&#039;&#039;&#039; button. It will take a few seconds for the interfaces to show enabled. If you still have access to the command line interface session, you will notice some system messages as the interface comes up.&lt;br /&gt;
# Perform steps B through F for interface &#039;&#039;&#039;Radio0-802.11A&#039;&#039;&#039;.&lt;br /&gt;
==Configure cipher type==&lt;br /&gt;
# In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;Security&#039;&#039;&#039; page. Again you will notice that the navigation menu expands to show sub sections of the security menu.&lt;br /&gt;
# Navigate to the &#039;&#039;&#039;Encryption &#039;&#039;&#039;sub section. Here you will notice that there is a page tab for each of the wireless interfaces. In this access point, you can configure different security measures for each interface. You will be setting them both the same.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Cipher&#039;&#039;&#039; option and then use the scroll menu to the right and select &#039;&#039;&#039;TKIP&#039;&#039;&#039; as the encryption type. We are bypassing WEP on this page as WEP has been found to be broken and insecure and we are choosing to use the more secure WPA option (next section).&lt;br /&gt;
# You will only be using one security key so choose an appropriate passphrase and type it into the &#039;&#039;&#039;Encryption Key 2&#039;&#039;&#039; field. You can choose a different key size of you choose to do so, but for our purposes, we left ours at 128 bits.&lt;br /&gt;
# Scroll down to the bottom of the page. As we are applying these settings to both wireless interfaces, we can click on the &#039;&#039;&#039;Apply-All&#039;&#039;&#039; button. This will save you from having to configure encryption settings for both interfaces.&lt;br /&gt;
==Configure WPA==&lt;br /&gt;
# Here, we will now configure SSID authentication essentially by using the previously defined encryption key as the pre-shared key (PSK). In the navigation menu on the left side of the screen, navigate to the &#039;&#039;&#039;SSID&#039;&#039;&#039; &#039;&#039;&#039;Manager&#039;&#039;&#039; page.&lt;br /&gt;
# In the &#039;&#039;&#039;Current SSID List&#039;&#039;&#039; window, click and select the SSID name.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authentication Settings&#039;&#039;&#039; section and make sure &#039;&#039;&#039;Open Authentication&#039;&#039;&#039; is selected. For a basic wireless configuration, you can leave the rest of this section configured with the defaults.&lt;br /&gt;
# Scroll down to the &#039;&#039;&#039;Authenticated Key Management&#039;&#039;&#039; section. Use the dropdown menu for Key Management to select &#039;&#039;&#039;Mandatory&#039;&#039;&#039; and then click and select the WPA option.&lt;br /&gt;
# Select either &#039;&#039;&#039;ASCII&#039;&#039;&#039; or &#039;&#039;&#039;Hexadecimal&#039;&#039;&#039; style passphrase, then enter an appropriate passphrase into the field for &#039;&#039;&#039;WPA Pre-shared Key&#039;&#039;&#039;.&lt;br /&gt;
# For the rest of this page, you can leave the rest of the configuration with the default settings. Scroll down to the bottom of the page and click on &#039;&#039;&#039;Apply&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
You should now have completed setting up basic wireless service with DHCP enabled to automatically negotiate network addressing. You should be able to connect a wireless device with the NIC to set to obtain an IP address automatically. There are a couple of ways to check who is connected to your network at any given time. In the web browser interface, selecting the &#039;&#039;&#039;Association&#039;&#039;&#039; page from the navigation menu will show you a graphical table with a MAC address and the IP address that is associated with it. You can get this same information using the command line interface by issuing the command &#039;&#039;&#039;show ip dhcp binding&#039;&#039;&#039; in the privileged EXEC mode command prompt.&lt;/div&gt;</summary>
		<author><name>JDO2010</name></author>
	</entry>
</feed>