User's Manual
xx
Cisco IOS Software Configuration Guide for Cisco Aironet Access Points
OL-11350-01
Preface
This guide also includes an overview of the access point web-based interface (APWI), which contains 
all the functionality of the command-line interface (CLI). This guide does not provide field-level 
descriptions of the APWI windows nor does it provide the procedures for configuring the access point 
from the APWI. For all APWI window descriptions and procedures, refer to the access point online help, 
which is available from the Help buttons on the APWI pages.
Organization
This guide is organized into these chapters:
Chapter 1, “Overview,” lists the software and hardware features of the access point and describes the 
access point’s role in your network.
Chapter 2, “Using the Web-Browser Interface,” describes how to use the web-browser interface to 
configure the access point.
Chapter 3, “Using the Command-Line Interface,” describes how to use the command-line interface (CLI) 
to configure the access point.
Chapter 4, “Configuring the Access Point for the First Time,” describes how to configure basic settings 
on a new access point.
Chapter 5, “Administering the Access PointWireless Device Access,” describes how to perform one-time 
operations to administer your access point, such as preventing unauthorized access to the access point, 
setting the system date and time, and setting the system name and prompt.
Chapter 6, “Configuring Radio Settings,” describes how to configure settings for the access point radio 
such as the role in the radio network, data rates, transmit power, channel settings, and others.
Chapter 7, “Configuring Multiple SSIDs,” describes how to configure and manage multiple service set 
identifiers (SSIDs) and multiple basic SSIDs (BSSIDs) on your access point. You can configure up to 16 
SSIDs and up to eight BSSIDs on your access point.
Chapter 8, “Configuring Spanning Tree Protocol,”describes how to configure Spanning Tree Protocol 
(STP) on your access point, bridge, or access point operating in a bridge mode. STP prevents bridge 
loops from occurring in your network.
Chapter 9, “Configuring an Access Point as a Local Authenticator,” describes how to configure the 
access point to act as a local RADIUS server for your wireless LAN. If the WAN connection to your 
main RADIUS server fails, the access point acts as a backup server to authenticate wireless devices.
Chapter 10, “Configuring Cipher Suites and WEP,” describes how to configure the cipher suites required 
to use authenticated key management, Wired Equivalent Privacy (WEP), and WEP features including 
MIC, CMIC, TKIP, CKIP, and broadcast key rotation.
Chapter 11, “Configuring Authentication Types,” describes how to configure authentication types on the 
access point. Client devices use these authentication methods to join your network.
Chapter 12, “Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion 
Detection Services,” describes how to configure the access point to participate in WDS, to allow fast 
reassociation of roaming client services, and to participate in radio management.
Chapter 13, “Configuring RADIUS and TACACS+ Servers,” describes how to enable and configure the 
RADIUS and Terminal Access Controller Access Control System Plus (TACACS+), which provide 
detailed accounting information and flexible administrative control over authentication and 
authorization processes. 
Chapter 14, “Configuring VLANs,” describes how to configure your access point to interoperate with 
the VLANs set up on your wired LAN. 










