Tip

Cisco wireless access point configuration from scratch

Learn what the Cisco 1242 wireless access point can do for you and how to configure one from scratch. This tip covers basic security settings, enabling the wireless radios, and how to make a successful connection. The 1242AG is a powerful business-grade wireless AP with lots of features.

I just unboxed my new Cisco 1242AG (part number AIR-AP1242AG-A-K9). This is a business-grade wireless AP that retails for about $500. Before I show you how I configured this wireless AP, let me give you a brief rundown of its capabilities.

What does the Cisco 1242AG AP offer me?

This Cisco 1242 wireless access point (AP), designed for business-grade users, is ideal if you have a lot of traffic and you need reliability and some advanced features. For a business, I would never install any consumer-grade AP unless I were looking for trouble. The reason is that those consumer-grade APs (the ones you can buy at your local electronics store) just don't have the capabilities, the reliability of connections, the troubleshooting, or the throughput to do what you need them to do.

Here is a photo of the 1242AG:

Here is a photo of the front of the AP:

More on wireless access
Complete Cisco documentation for the Cisco AP1242

Penetration testing -- Securing wireless access points

Configuring and troubleshooting wireless LAN clients 

Wireless access points: Placement checklist

The IT Guy: WAP placement (Cartoon)

As you can see, this AP has a power connection port (which goes to an AC/DC adapter), a console port, Ethernet port (to connect to the physical LAN), and indicator lights. You can also power the AP over the Ethernet wire with PoE (802.3af) On this model of AP, you will notice four black rubber covers. These cover the connectors for the wireless antennas (two on the front and two on the back).

On the front of the AP are the two antenna connectors for the 2.4Ghz network, with the right connector being the primary. On the back are the connectors for the 5Ghz network. These antennas can be bought separately and are required only if you want to extend the range in some way or do point-to-point bridging between APs. In a business network, you often want to extend or shape the wireless range, both for coverage and security. In that case, you would want to investigate and use the external antennas.

The 1242 offers the following:

  • A, B and G wireless protocols in the 2.4Ghz and 5Ghz wireless ranges
  • A long list of security protocols that you won't find in consumer-grade APs
  • Intrusion detection and prevention
  • Hardware-assisted AES encryption
  • Locking mounting bracket and a rugged NEMA metal case
  • Compatibility with Cisco's wireless management applications
  • That Cisco IOS CLI look and feel that we are used to configuring (or a Web browser interface if you so desire)

You can find more specifics on these APs at the Cisco homepage for the Aironet 1242 series.

Configuring the 1242 wireless AP

Here are the steps I took to get my wireless AP functioning on my network:

1. Connect to power and LAN Ethernet

2. AP obtains IP address from DHCP server. I went to my DHCP server and found the IP address that it had obtained:

Alternatively, you can configure a static IP address on the AP using the console port, like this:

3. Point your Web browser to the AP. In my case, the DHCP-obtained IP address was 192.168.1.106. The default login (console or Web) is Cisco and Cisco (not cisco and cisco) for the username and password. Here is what I saw:

Notice how both the 2.4Ghz and 5Ghz radios show to be "down." On APs with version 12.3(4)JA and above, the wireless radio is disabled by default, and there is no SSID configured. This is for security reasons.

Also, note on the menu selections for the interface that there are options for Express Setup and Express Security. If these are available, why not use them?

4. Click on Express Setup. Notice the changes I made in the following screen. Not all of these are required. I changed the AP's name, set it to a static IP, changed the SNMP community string, and took the default of "Access Point" for both radios.

Next, I clicked Apply. I was redirected to the new IP address of the AP and I had to log in again.

5. Next, I clicked on Express Security and set the SSID, the SSID to be broadcast, and 40bit WEP encryption with a static key (basic, I know -- but just an example).

6. There are two important things still left to do -- change the admin password and enable the radios. To enable the radios, I clicked in Network Interfaces, on the left. In my case, I was only using the 2.4Ghz radio so I clicked on Radio0-802.11G, then on the Settings tab. I clicked on Enable for the radio and took all the other default settings.

At the bottom of the page, I clicked "Apply."

7. Finally, let's change the admin password so that no one else can get into our AP. To do this, I clicked on Security on the left hand side, then Admin Access. From here, I changed the default Authentication password and clicked Apply. I had to reauthenticate to the AP.

Then I created a new account called Admin with a secure password, and Read-Write capability (clicked Apply). After that, I deleted the default Cisco account (clicked Apply).

Here is what it looked like:

Note that we still have a single global password for all users. You may want to change this so that individual users will have their own passwords.

8. At this point, I could see the wireless network from my Windows computer and could successfully connect to it using the configured WEP key. My computer received a DHCP IP address from my DHCP server.

Configuration Successful!

About the author:
David Davis (CCIE #9369, CWNA, MCSE, CISSP, Linux+, CEH) has been in the IT industry for 15 years. Currently, he manages a group of systems/network administrators for a privately owned retail company and authors IT-related material in his spare time. He has written more than 100 articles, eight practice tests and four video courses and has co-authored one book. His Web site is HappyRouter.com.

Dig Deeper on Network infrastructure