3x Cisco 1252 Wap Config/Scenario

Hi Everyone,
I have the chance to acquire quite a few Cisco 1252 LWAP's. I know it's possible to convert them to standalone AP's, so that's no issue.. Except maybe getting access to the IOS image?
Hoping I could use them in the following scenario. I work on special events & concert tours in large arenas & venues. I'd like to setup 3 of these units to work together to cover the venue. 1 at the back of the room where the audio console would normally be & the other two either side of the stage. There would only ever be 1 or 2 clients which are the tablets that control the audio systems DSP.
Is it possible to use them in standalone mode, all on the same SSID but on Ch 1, 6, 11? How does this work in the 'N' range?
We have a consistent issue that a single AP (older Cisco 1100) works fine with an empty arena, but stops working as soon as the room fills with people & there cell phones.
All your help would be greatly appreciated!
Sent from Cisco Technical Support iPhone App

Ok.  I changed the channel width to above 40 mhz.  This gets me to 150 Mbps.  Anything else to try?  Is the encryption mode correct?
interface Dot11Radio1
no ip address
no ip route-cache
encryption mode ciphers aes-ccm tkip
ssid myssid
dfs band 3 block
speed  basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15
channel width 40-above
channel dfs
station-role root
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
end

Similar Messages

  • HP Wireless Printers cannot connect to WPA2-secured WiFi networks with Cisco/Meraki WAPs

    In the last two months, I've had the displeasure of working with two very different HP printers and attempting to make them work on a WPA2-secured wireless network.  All attempts to authenticate fail with "invalid phassphrase". 
    I'm not the first person to encounter this, it's a problem with many different HP wireless printers (I just happen to have physical access to the OfficeJet Pro 8610 & Deskjet 3511). 
    My equipment is a Cisco ASA 5505 Firewall running ASA 9.1x & Cisco Aironet 1142 running IOS 15.3.x. 
    What does work on the WPA2/AES SSID:  Apple MacBook Air running OSX 10.10.2, Three Windows-Based laptops running Windows 8.1 Update 1, an iPhone 5s, Three Windows Phone 8.1 devices, Roku 2, PlayStation 4, PlayStation 3, Sharp Aquos TV, Amazon Streaming Stick, and an Android Tablet (Jellybean).  Basically, everything. 
    What does not work on the WPA2 network:  OfficeJet Pro 8610 & Deskjet 3511.
    To test the theory there is a problem with HP's implementation of WPA2 with regard to Cisco Aironet IOS, I built out a second SSID that only works in WPA/TKIP mode.  This solution works.  Both HP printers will join the WPA/TKIP network.
    So, I'm able to demonstrate there is a certain connectivity issue.  When i look at AAA Debug on the WAP's console, I can observe the HPs attempt to authenticate "Bind I/F" on the WPA2 SSID, however they do not achieve authentication and do not pass the AAA phase.  However, on the WPA SSID, they bind and authenticate successfully. 
    To help illustrate this, here is my WAP running config.  It's about as simple as it can get.  There is no relevant MAC filtering or ACLs bound to any interface.  Noting that I have an ACL on remote access to the WAP (i.e. Locked down to SSH, disabling telnet).  The main point being that the ASA firewall is not a factor in this problem as the issue is at the WAP before WPA2 authentication can complete, therefore the printers never reach the network / when the printers connect to the WPA network, the operate fully & correctly. 
    If anyone at HP can indicate why this particular config is somehow improper or broken, that would be fantastic.  There should be no reason why Cisco / Meraki WAP owners have to lower wireless encryption standards just for a printer, be forced into wired, create separate SSIDs with lower encryption specifically for a device. 
    Building configuration...
    Current configuration : 6064 bytes
    ! Last configuration change at 12:46:47 UTC Fri Aug 20 1993 by admin
    version 15.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname 10-10-50-1
    logging buffered 1024768
    logging rate-limit console 9
    aaa new-model
    aaa authentication login default local
    aaa authorization exec default local
    aaa session-id common
    no ip source-route
    no ip cef
    ip domain name freedom.local
    dot11 syslog
    dot11 vlan-name inside vlan 50
    dot11 vlan-name inside-wpa-only vlan 70
    dot11 ssid inside
       vlan 50
       band-select
       authentication open
       authentication key-management wpa version 2
       mbssid guest-mode
       wpa-psk ascii 7 xxxxxx
       information-element ssidl
    dot11 ssid inside-wpa-only
       vlan 70
       band-select
       authentication open
       authentication key-management wpa
       mbssid guest-mode
       wpa-psk ascii 7 xxxxxx
       information-element ssidl
    dot11 band-select parameters
       cycle-count 3
       cycle-threshold 200
       expire-supression 20
       expire-dual-band 60
       client-rssi 75
    dot11 wpa handshake timeout 500
    dot11 network-map
    username ADMIN privilege 15 secret 5 xxxxxx
    ip ssh version 2
    bridge irb
    interface Dot11Radio0
     no ip address
     no ip route-cache
     encryption vlan 50 mode ciphers aes-ccm
     encryption vlan 70 mode ciphers aes-ccm tkip
     ssid inside
     ssid inside-wpa-only
     antenna gain 0
     mbssid
     speed  basic-1.0 basic-2.0 basic-5.5 basic-11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
     channel 2412
     station-role root
     l2-filter bridge-group-acl
    interface Dot11Radio0.50
     encapsulation dot1Q 50 native
     no ip route-cache
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface Dot11Radio0.70
     encapsulation dot1Q 70
     no ip route-cache
     bridge-group 70
     bridge-group 70 subscriber-loop-control
     bridge-group 70 input-address-list 700
     bridge-group 70 output-address-list 700
     bridge-group 70 spanning-disabled
     bridge-group 70 block-unknown-source
     no bridge-group 70 source-learning
     no bridge-group 70 unicast-flooding
    interface GigabitEthernet0
     no ip address
     no ip route-cache
     duplex auto
     speed auto
    interface GigabitEthernet0.50
     encapsulation dot1Q 50 native
     no ip route-cache
     bridge-group 1
     bridge-group 1 spanning-disabled
     no bridge-group 1 source-learning
    interface GigabitEthernet0.70
     encapsulation dot1Q 70
     no ip route-cache
     bridge-group 70
     bridge-group 70 spanning-disabled
     no bridge-group 70 source-learning
    interface BVI1
     mac-address xxxx.xxxx.xxxx
     ip address 10.10.50.1 255.255.255.0
     no ip route-cache
    ip forward-protocol nd
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip route 0.0.0.0 0.0.0.0 10.10.50.2
    logging history size 100
    access-list 111 permit tcp any any neq telnet
    bridge 1 route ip
    line con 0
     access-class 111 in
    line vty 0 4
     access-class 111 in
     length 0
     transport input ssh
    line vty 5 15
     access-class 111 in
     transport input ssh
    end

    I get the same behavior with a laserjet m451nw. I need to enable tkip to get the printer working, it doesn't support pure aes-ccm (every other device here supports pure aes-ccm, even cheap ones), although it's advertised as working.
    The following snippet of config works, but I still think it should work without the tkip "hack".
    dot11 ssid whatever
    vlan 1
    band-select
    authentication open
    authentication key-management wpa version 2
    interface Dot11Radio0
    encryption vlan 1 mode ciphers aes-ccm tkip

  • Configuring N channel on cisco 1252 Access Point

    Hi,
    Can someone help me for configuring N-Series band on Cisco 1252 Access Point in IOS Mode.
    Thanks
    Tabrez

    Firstly you need to use WPA2/AES or OPEN authentication.
    Cisco 802.11n Design and Deployment Guidelines
    http://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns348/ns767/white_paper_80211n_design_and_deployment_guidelines.html

  • Cisco 1252 Access Point Read Write Account

    HI
    i sent out a Cisco 1252 AP to one of my sites and i removed the default cisco account from the device before i shipped it and now when i try to get into
    it i can't .I can get logged in through telnet and it's working fine but i just can't get into the web interface. is there a way to re add the cisco account through command line so that i can log into it.
    Thanks in advance

    I tried that and it still dosen't work, do you think that i will need to just send them another AP fresh out the box with the account in it.

  • Cisco 1142 WAP Connection Help

    We have a Cisco 1142 WAP connected to a Cisco Wireless Controller in a remote office area.  For meetings we wanted to have more hard wired connections in addition to Wifi access for attendee's / presentors etc..My question is if we purchased a Cisco 8 port POE mini switch and put that in the middle between the WAP and Controller would that work?  Or is there another business grade solution for a mix of Ethernet ports and Wifi?

    Yes, sir.  This will work.  The only "problem" I see is your 8 port PoE switch.  Let me explain:
    The good part about Cisco's 8-port PoE switches, the WS-C3560-8PC, is that it is FANLESS.  So even if you stick the switch right inside this conference or meeting room, no one will notice it's there (unless of course, one steps on the hot surface or gives the appliance a good kick).
    This model has a 1Gig SFP or RJ45 port uplink.
    Now the downside is not really that significant, unless you want to be pedantic about it.  The access ports are all 10/100BaseTX only.  
    By the way, I have no way of testing the "compact" series of the 2960C and the 3560C.  The Data Sheet itself is a bit "grey" so I won't make a comment about these two models.

  • Cisco 1252 upgrade from standalone autonomous to LWAPP

    Hi All,
    Can somebody please guide me through the process of upgrading Cisco 1252 access point from Autonomous to Light Weight
    iam attaching show version log which gives information about current IOS
    on the access point & its in standalone mode now.
    Any help would be greatly appreciated.
    Cheers,
    Satish

    Hi Satish,
    These two great threads discuss the methods to make this conversion;
    From Steve, Leo and Charles;
    http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Wireless%20-%20Mobility&topic=General&topicID=.ee6e8b8&fromOutline=true&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc2c5c3/0
    From Scott and Steve;
    http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Wireless%20-%20Mobility&topic=Getting%20Started%20with%20Wireless&topicID=.ee7c7c3&fromOutline=true&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc2fd83/0
    Hope this helps!
    Rob

  • Cisco 2702I WAPs won't join 5508 WLC

    I haven't been able to get a few WAPs to join my existing WLC and network.  They don't seem to be pulling any IP address or talking to DHCP, but everything has been already configured and the same as the other buildings that I have deployed these WAPS on.  any thoughts?
    Here is the Show Running-Config and Show ip interface brief commands output.
    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2015.04.20 13:39:23 =~=~=~=~=~=~=~=~=~=~=~=
    show ip interface briefrunning-config    
    Building configuration...
    Current configuration : 17458 bytes
    ! Last configuration change at 00:00:33 UTC Mon Mar 1 1993
    version 15.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname APf07f.0692.ff0c
    logging rate-limit console 9
    enable secret 5 $1$3GAl$UQHPfp.Ab7Ry0HSsQJTRn/
    aaa new-model
    aaa authentication login default local
     --More--        !
    aaa session-id common
    ip cef
    power inline negotiation prestandard source
    crypto pki trustpoint airespace-old-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-new-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-device-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint cisco-root-cert
     --More--         revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint Cisco_IOS_MIC_cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki certificate chain airespace-old-root-cert
     certificate ca 00
      30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      818F310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 0355040A 
      130D6169 72657370 61636520 496E6331 0D300B06 0355040B 13046E6F 6E65310B 
      30090603 55040313 02636131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D301E17 0D303330 32313232 33333835 
      355A170D 31323131 31313233 33383535 5A30818F 310B3009 06035504 06130255 
      53311330 11060355 0408130A 43616C69 666F726E 69613111 300F0603 55040713 
      0853616E 204A6F73 65311630 14060355 040A130D 61697265 73706163 6520496E 
      63310D30 0B060355 040B1304 6E6F6E65 310B3009 06035504 03130263 61312430 
      2206092A 864886F7 0D010901 16157375 70706F72 74406169 72657370 6163652E 
      636F6D30 81DF300D 06092A86 4886F70D 01010105 000381CD 003081C9 0281C100 
      DB9D3901 30059DD1 05CB2793 9B9907F8 1FF57FA9 24065BF7 1A5865F8 B9CFCCB3 
     --More--          679354D4 69BAB847 1CA327AE EA006AAC 90479C9D C23B67DE FACC0D28 32C6103F 
      A59C41E2 E8B4250B 4D2903EB 52629A99 D618B747 C4A94151 1AB995BB 14905404 
      5F4A0B9F F387F346 D5F3A249 2AED1B6A 3DD639D8 4924366A 1234DD2D B13CD489 
      7E2EA101 63BCCC82 2F7A6D0B 33AB5705 3C784A6D A3DD1E5B 96CF54C6 CF4D59BC 
      1BFD6CB6 E72FCB29 88DCBE6D 4D76FB83 1FAF5683 E4E20822 00A9EB2E 3BEF0DF9 
      02030100 01A381EF 3081EC30 1D060355 1D0E0416 04149457 DF7D1482 2D31BB28 
      772E8996 1886DA46 84BA3081 BC060355 1D230481 B43081B1 80149457 DF7D1482 
      2D31BB28 772E8996 1886DA46 84BAA181 95A48192 30818F31 0B300906 03550406 
      13025553 31133011 06035504 08130A43 616C6966 6F726E69 61311130 0F060355 
      04071308 53616E20 4A6F7365 31163014 06035504 0A130D61 69726573 70616365 
      20496E63 310D300B 06035504 0B13046E 6F6E6531 0B300906 03550403 13026361 
      31243022 06092A86 4886F70D 01090116 15737570 706F7274 40616972 65737061 
      63652E63 6F6D8201 00300C06 03551D13 04053003 0101FF30 0D06092A 864886F7 
      0D010104 05000381 C100AEB0 349DC0F9 2AAA3A57 75B3A79C 5421A9D0 15389261 
      95C03479 04DA81D4 120F58FA E2299223 BEB54A90 6D70F7F7 2192EFAF A4B0F488 
      604E3094 BBCC77A3 60A88129 0849B87B 5CA1AA17 21922A55 6B68E0D3 1ADC7264 
      C4C4D6B2 33345C86 254E4988 096645CD 40F12761 8BC37E71 DAD91677 25322361 
      71D87A16 F92AF7C1 51CB8892 443BC666 59BEA47B 985E8866 68A1EBD4 88BBF6E7 
      A949FDF8 7711D518 A80E203D A12BEBDC 6963EDA7 B76079A3 22380C96 0CB8D324 
      CADD949D EA39E0EF 033D
      quit
    crypto pki certificate chain airespace-new-root-cert
     certificate ca 00
     --More--          3082045A 30820383 A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
      70616365 2E636F6D 301E170D 30333037 33313133 34313232 5A170D31 33303432 
      39313334 3132325A 3081A631 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 
      61636520 526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D3081DF 300D0609 2A864886 F70D0101 
      01050003 81CD0030 81C90281 C100CCA0 F92330BD 49E947A4 3FA2ACF3 A4827F66 
      77BB66F4 6B1636BA 84EF0966 9CCAE0EA CA6F1D0F BA90FEFA 58B8502C 10FC78DC 
      C9D126D8 8F2AD059 A8A69BFE 90324BD6 4553CED9 131B99B0 282A73D9 8655EFAF 
      5EA54096 22E54B9F C4258988 78F1A51F F47B16F2 0C0A37A3 52603A5A B0DC4533 
      B0C0B7C8 02DF25F0 585DFF5F 43FDAE1F 48A34BDF F80AC27E 30BE931B D3490ADE 
      C81FF6F9 974F1408 55C8813F D334F1B8 A1892B0A 10D98A44 7DBF213E 64520D20 
      E78E9
    Not in Bound state.322 DA11CA7A 46ACEB41 46AB0203 010001A3 82011430 82011030 1D060355 
      1D0E0416 0414538D 8360478D C20F8066 3232E9E1 7070552B 17EA3081 D3060355 
     --More--          1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
      61697265 73706163 652E636F 6D820100 300C0603 551D1304 05300301 01FF300B 
      0603551D 0F040403 02010630 0D06092A 864886F7 0D010104 05000381 C10006E3 
      653D4B19 FAA0C3B9 8EAE23C5 A3305E42 4522A961 BE1B5B88 56ED2E5A E42F7AC0 
      26AA2805 9824080D 1512169B 44E42847 2EBBA573 29F070DB 56011C7B E9F3A240 
      399A3557 A50384EC A0353DCF 49E8EC01 94047469 0BC12079 2764873D 25943DCD 
      66A
    *Mar  1 02:26:43.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.9726F 4A79EB40 1C7C6897 4E925D80 2313C126 1F604763 A9D9AC1F DF0092F6 
      57DF1AB4 9B904E22 CE5515CD 44F68A00 4E2BC861 FBC1540D C1F3A66B 8CDDC1C2 
      7C442027 E6241198 B0E002DE 9E06D64F 0D538987 96C1C0DB 12B0F581 6FED
      quit
    crypto pki certificate chain airespace-device-root-cert
     certificate ca 03
      3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
     --More--          70616365 2E636F6D 301E170D 30353034 32383232 33373133 5A170D31 35303132 
      36323233 3731335A 3081A831 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1C301A06 03550403 13134169 72657370 
      61636520 44657669 63652043 41312430 2206092A 864886F7 0D010901 16157375 
      70706F72 74406169 72657370 6163652E 636F6D30 81DF300D 06092A86 4886F70D 
      01010105 000381CD 003081C9 0281C100 A93C0158 E7284E75 FF86A57A 886ACA37 
      430BECF0 7582F56B DB6AC514 554FB06E AA327B3E CE3C9391 03C93BA4 0C0AF932 
      A6CB5DA3 F1C3C528 53BF4E19 2C1BFC48 467EBD93 06B4974A 1273BF35 8AD8540F 
      261E612B A2673B68 D239C87E 1E9E967B 2654D285 45BB7F78 5F4E9D4B 7B8001AA 
      2F455CFF 4552ECDB 5667E3FC E7093E06 8FAE353D 4228B48D 8B415D9B F496342D 
      C1459987 B69BFA4B 51FB67B4 A0C21E7F C6269A39 47EB1D48 5E83B129 8B079E5E 
      1EDAB5A0 BE5E1DE0 109FF0BD 4750E32B 02030100 01A38201 37308201 33300C06 
      03551D13 04053003 0101FF30 2E060960 86480186 F842010D 0421161F 41697265 
      73706163 65204465 76696365 20434120 43657274 69666963 61746530 1D060355 
      1D0E0416 04140A52 3BB12570 523B9CEA 747FB2AD 3D8F95EA 3FCC3081 D3060355 
      1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
     --More--          61697265 73706163 652E636F 6D820100 300D0609 2A864886 F70D0101 04050003 
      81C100A0 E8D59D9B DA9EED0C 96045DFE A37084EC 59B5C3D3 71694DB0 70664E0C 
      8060D69E E366E81F 9F3CCF68 8AB0498E CCFA6CA7 2854F2D8 046690C9 8FEC84EF 
      2F7F0F08 C90F719D C0F4C125 CED1B525 6DD93E51 777BD5E8 7F1DC79F CC502DC2 
      0242C05D 1682DEE3 DF7541B8 C55B433C 10DFE2BF D2E802E7 D923329A 23A2076F 
      86BCC048 D569B383 59AC8979 97F02C55 6F8FE318 754F605C 43CDA7C8 1847B085 
      1DADF0D6 CD62C8DE A86E6E12 4A7CDCBF A6FCC7E1 852A1DB1 529D63B3 688305F6 7BD25F
      quit
    crypto pki certificate chain cisco-root-cert
     certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
      30820343 3082022B A0030201 0202105F F87B282B 54DC8D42 A315B568 C9ADFF30 
      0D06092A 864886F7 0D010105 05003035 31163014 06035504 0A130D43 6973636F 
      20537973 74656D73 311B3019 06035504 03131243 6973636F 20526F6F 74204341 
      20323034 38301E17 0D303430 35313432 30313731 325A170D 32393035 31343230 
      32353432 5A303531 16301406 0355040A 130D4369 73636F20 53797374 656D7331 
      1B301906 03550403 13124369 73636F20 526F6F74 20434120 32303438 30820120 
      300D0609 2A864886 F70D0101 01050003 82010D00 30820108 02820101 00B09AB9 
      ABA7AF0A 77A7E271 B6B46662 94788847 C6625584 4032BFC0 AB2EA51C 71D6BC6E 
      7BA8AABA 6ED21588 48459DA2 FC83D0CC B98CE026 68704A78 DF21179E F46105C9 
      15C8CF16 DA356189 9443A884 A8319878 9BB94E6F 2C53126C CD1DAD2B 24BB31C4 
      2BFF8344 6FB63D24 7709EABF 2AA81F6A 56F6200F 11549781 75A725CE 596A8265 
      EFB7EAE7 E28D758B 6EF2DD4F A65E629C CF100A64 D04E6DCE 2BCC5BF5 60A52747 
      8D69F47F CE1B70DE 701B20D6 6ECDA601 A83C12D2 A93FA06B 5EBB8E20 8B7A91E3 
     --More--          B568EEA0 E7C40174 A8530B2B 4A9A0F65 120E824D 8E63FDEF EB9B1ADB 53A61360 
      AFC27DD7 C76C1725 D473FB47 64508180 944CE1BF AE4B1CDF 92ED2E05 DF020103 
      A351304F 300B0603 551D0F04 04030201 86300F06 03551D13 0101FF04 05300301 
      01FF301D 0603551D 0E041604 1427F3C8 151E6E9A 020916AD 2BA08960 5FDA7B2F 
      AA301006 092B0601 04018237 15010403 02010030 0D06092A 864886F7 0D010105 
      05000382 0101009D 9D8484A3 41A97C77 0CB753CA 4E445062 EF547CD3 75171CE8 
      E0C6484B B6FE4C3A 198156B0 56EE1996 62AA5AA3 64C1F64E 5433C677 FEC51CBA 
      E55D25CA F5F0939A 83112EE6 CBF87445 FEE705B8 ABE7DFCB 4BE13784 DAB98B97 
      701EF0E2 8BD7B0D8 0E9DB169 D62A917B A9494F7E E68E95D8 83273CD5 68490ED4 
      9DF62EEB A7BEEB30 A4AC1F44 FC95AB33 06FB7D60 0ADEB48A 63B09CA9 F2A4B953 
      0187D068 A4277FAB FFE9FAC9 40388867 B439C684 6F57C953 DBBA8EEE C043B2F8 
      09836EFF 66CF3EEF 17B35818 2509345E E3CBD614 B6ECF292 6F74E42F 812AD592 
      91E0E097 3C326805 854BD1F7 57E2521D 931A549F 0570C04A 71601E43 0B601EFE 
      A3CE8119 E10B35
      quit
    crypto pki certificate chain Cisco_IOS_MIC_cert
     certificate 2DCD1F0500000015BE7F
      30820470 30820358 A0030201 02020A2D CD1F0500 000015BE 7F300D06 092A8648 
      86F70D01 01050500 30393116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311F 301D0603 55040313 16436973 636F204D 616E7566 61637475 72696E67 
      20434130 1E170D31 34303832 38313834 3030395A 170D3234 30383238 31383530 
      30395A30 818C310B 30090603 55040613 02555331 13301106 03550408 130A4361 
      6C69666F 726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 
     --More--          0355040A 130D4369 73636F20 53797374 656D7331 1B301906 03550403 13124150 
      3347322D 66303766 30363932 66663063 3120301E 06092A86 4886F70D 01090116 
      11737570 706F7274 40636973 636F2E63 6F6D3082 0122300D 06092A86 4886F70D 
      01010105 00038201 0F003082 010A0282 01010095 69DD9DFC D4FC9F91 6781A9EF 
      51713883 49968E78 05AF6140 CB9A08D9 E1066298 C8F3A072 3AC2FBDB 1E9E43E2 
      87E6C5A8 2FC83AE1 9C563022 17AD76D8 9D76DFD0 E5C4E01A 3A177708 FE60E3B9 
      AA362983 6DFBE7A0 7D902420 74C56700 E1DC2DEA 629E9CAE 333E3038 6EC4C07B 
      2CEF08B7 AC69E43D B06B28C7 8D6226F7 0BC77566 BFFC3B3C 26E90F05 2D342B59 
      9045D6D2 445313FE B551E815 E09C5872 69DF456F C15A81BA 1F3E6B35 7AE4C2BC 
      92B4F61B 8E4DEE97 DC569763 32578BBF 909FE970 00445AFA 1CF98D73 D5EC3ED2 
      ED0A909C 6381E83C 830D8262 23540044 FF438C72 BB21AB47 1E610815 E0737911 
      78820812 E0ED4512 04E892BD 3FA9DD0A 42409302 03010001 A3820124 30820120 
      300E0603 551D0F01 01FF0404 030205A0 301D0603 551D0E04 16041417 4C35E9C4 
      88705E88 3A3DF87C A014FD3E A6ABB930 1F060355 1D230418 30168014 D0C52226 
      AB4F4660 ECAE0591 C7DC5AD1 B047F76C 303F0603 551D1F04 38303630 34A032A0 
      30862E68 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 72697479 
      2F706B69 2F63726C 2F636D63 612E6372 6C304C06 082B0601 05050701 01044030 
      3E303C06 082B0601 05050730 02863068 7474703A 2F2F7777 772E6369 73636F2E 
      636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 6D63612E 63657230 
      3F06092B 06010401 82371402 04321E30 00490050 00530045 00430049 006E0074 
      00650072 006D0065 00640069 00610074 0065004F 00660066 006C0069 006E0065 
      300D0609 2A864886 F70D0101 05050003 82010100 59C70FBE 43641BFE 99434812 
      BEDDE616 093F4F5F 2FF1F0A4 983969F6 CF175C8A 0DF1D329 5A11ADB1 B7E81DF3 
     --More--          FFBF0415 40884186 2C2C6B2F 99798BEF ECBFCFA5 76D64C5B 0E3FA230 3AFF71D4 
      ABAB9570 8FA2F2BA 4065622A 1202FDBA 858BD99B 59DCF8AD 729279E2 12CB91BE 
      7CEEF9BC 667016B6 DB426925 CBE489F3 271EEF13 5CCBA25E 9013D989 66DE5837 
      1C5EE17B 144256A5 8473189D 8F954745 7D6543B2 1B12ED90 C38C56A7 AC941524 
      DF999DAB 87510E6B 970CFC97 66FE086A 449B3C99 C22FE3A1 74278F5E 58551DA5 
      E2442DC3 1A7A991F 4AB107CA 6CD6169E B750494C 23CFAEE3 92507539 E734D21A 
      F60D6C15 3F551769 D1BE9102 690122D7 A59E2D94
      quit
     certificate ca 6A6967B3000000000003
      308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648 
      86F70D01 01050500 30353116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311B 30190603 55040313 12436973 636F2052 6F6F7420 43412032 30343830 
      1E170D30 35303631 30323231 3630315A 170D3239 30353134 32303235 34325A30 
      39311630 14060355 040A130D 43697363 6F205379 7374656D 73311F30 1D060355 
      04031316 43697363 6F204D61 6E756661 63747572 696E6720 43413082 0120300D 
      06092A86 4886F70D 01010105 00038201 0D003082 01080282 010100A0 C5F7DC96 
      943515F1 F4994EBB 9B41E17D DB791691 BBF354F2 414A9432 6262C923 F79AE7BB 
      9B79E807 294E30F5 AE1BC521 5646B0F8 F4E68E81 B816CCA8 9B85D242 81DB7CCB 
      94A91161 121C5CEA 33201C9A 16A77DDB 99066AE2 36AFECF8 0AFF9867 07F430EE 
      A5F8881A AAE8C73C 1CCEEE48 FDCD5C37 F186939E 3D71757D 34EE4B14 A9C0297B 
      0510EF87 9E693130 F548363F D8ABCE15 E2E8589F 3E627104 8726A415 620125AA 
      D5DFC9C9 5BB8C9A1 077BBE68 92939320 A86CBD15 75D3445D 454BECA8 DA60C7D8 
      C8D5C8ED 41E1F55F 578E5332 9349D5D9 0FF836AA 07C43241 C5A7AF1D 19FFF673 
     --More--          99395A73 67621334 0D1F5E95 70526417 06EC535C 5CDB6AEA 35004102 0103A382 
      01E73082 01E33012 0603551D 130101FF 04083006 0101FF02 0100301D 0603551D 
      0E041604 14D0C522 26AB4F46 60ECAE05 91C7DC5A D1B047F7 6C300B06 03551D0F 
      04040302 01863010 06092B06 01040182 37150104 03020100 30190609 2B060104 
      01823714 02040C1E 0A005300 75006200 43004130 1F060355 1D230418 30168014 
      27F3C815 1E6E9A02 0916AD2B A089605F DA7B2FAA 30430603 551D1F04 3C303A30 
      38A036A0 34863268 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 
      72697479 2F706B69 2F63726C 2F637263 61323034 382E6372 6C305006 082B0601 
      05050701 01044430 42304006 082B0601 05050730 02863468 7474703A 2F2F7777 
      772E6369 73636F2E 636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 
      72636132 3034382E 63657230 5C060355 1D200455 30533051 060A2B06 01040109 
      15010200 30433041 06082B06 01050507 02011635 68747470 3A2F2F77 77772E63 
      6973636F 2E636F6D 2F736563 75726974 792F706B 692F706F 6C696369 65732F69 
      6E646578 2E68746D 6C305E06 03551D25 04573055 06082B06 01050507 03010608 
      2B060105 05070302 06082B06 01050507 03050608 2B060105 05070306 06082B06 
      01050507 0307060A 2B060104 0182370A 0301060A 2B060104 01823714 02010609 
      2B060104 01823715 06300D06 092A8648 86F70D01 01050500 03820101 0030F330 
      2D8CF2CA 374A6499 24290AF2 86AA42D5 23E8A2EA 2B6F6923 7A828E1C 4C09CFA4 
      4FAB842F 37E96560 D19AC6D8 F30BF5DE D027005C 6F1D91BD D14E5851 1DC9E3F7 
      38E7D30B D168BE8E 22A54B06 E1E6A4AA 337D1A75 BA26F370 C66100A5 C379265B 
      A719D193 8DAB9B10 11291FA1 82FDFD3C 4B6E65DC 934505E9 AF336B67 23070686 
      22DAEBDC 87CF5921 421AE9CF 707588E0 243D5D7D 4E963880 97D56FF0 9B71D8BA 
      6019A5B0 6186ADDD 6566F6B9 27A2EE2F 619BBAA1 3061FDBE AC3514F9 B82D9706 
     --More--          AFC3EF6D CC3D3CEB 95E981D3 8A5EB6CE FA79A46B D7A25764 C43F4CC9 DBE882EC 
      0166D410 88A256E5 3C57EDE9 02A84891 6307AB61 264B1A13 9FE4DCDA 5F
      quit
    username Cisco secret 5 $1$.UkK$3GDTdydbzaupRq0u6bml9/
    ip ssh version 2
    bridge irb
    interface GigabitEthernet0
     duplex auto
     speed auto
    interface GigabitEthernet0.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 spanning-disabled
    interface GigabitEthernet1
     shutdown
     duplex auto
     --More--         speed auto
     bridge-group 1
    interface BVI1
     ip address dhcp client-id BVI1
    ip forward-protocol nd
    ip route 0.0.0.0 0.0.0.0 BVI1
    logging trap emergencies
    logging facility kern
    logging snmp-trap notifications
    logging snmp-trap informational
    logging snmp-trap debugging
    bridge 1 protocol ieee
    bridge 1 route ip
    line con 0
    line vty 0 4
     transport input all
    line vty 5 15
     transport input all
     --More--        end
    APf07f.0692.ff0c# show running-configip interface brief
    Interface                  IP-Address      OK? Method Status                Protocol
    BVI1                       unassigned      YES DHCP   up                    up      
    GigabitEthernet0           unassigned      NO  unset  up                    up      
    GigabitEthernet0.1         unassigned      YES unset  up                    up      
    GigabitEthernet1           unassigned      NO  unset  administratively down down    
    APf07f.0692.ff0c#
    Not in Bound state.
    *Mar  1 02:27:33.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:28:23.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:29:13.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:30:03.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.

    Hi,
    First check that a DHCP pool is configured for APs to pull IP address then only AP will be try to discover the WLC.
    Most of the time these problem(AP join) arise when you don't have correct software version on WLC.
    For 2702 AP, you need at-least 7.6.120.0 version on WLC.
    Here is the matrix: http://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html
    Fore more info, paste the info which Rasika asked.
    Regards

  • Cisco 1252s with regular 802.3af PoE switches - what are the impacts?

    Does anyone have any real-life experience with deploying the 1252s on regular 802.3af PoE switches?  I have a few 1252s one some 3560 PoE ports and the show up with "low power" alarms.
    I am wondering what the real world impact is with this scenario.  The 1252s have both 2.4 Ghz and 5.0 Ghz radios in them and I have HT enabled on the controller.
    I'm wondering what capabilities I am losing by running on 802.3af power besides the annoyance of the alarms.
    Thanks in advance!

    Sorry in advance for the book I have just written.
    I have three 1252s on 75 feet of Cat5e cable running to a 3560 PoE switch. Sometimes, but not always, I see a low power alarm on the access point(s). This is in a small building that is built like a fortress so the RF environment is somewhat challenging. I am watching WCS closely and see all three 2.4 GHz radios powered all the way up to power level 1. I notice that two of the 5GHz radios are on power level 1, and one is on level 3. I thought that RRM would not power anything down until you had at least four access points as RF neighbors. I believe I read that in a Ciscopress book and it seems to be true everywhere in our network when I look at buildings with 3 or less WAPs.
    The building in question does not have any other buildings close by with any 5GHz radios in operation - or at least I didn't see any when I did the survey.
    I'm wondering if the power setting of the radios is also related to the length of the Cat5e cabling. Seems to me a shorter run would have less resistance than longer runs, allowing the radio to have more power.
    My main concern is not this building in question, since we went for coverage and not client density in the design. We several other buildings on the radar, all libraries, which are going to be both RF challenging (bookshelves, furniture, cubicles, cubbies) and client-density challenged. These buildings have hundreds of WLAN clients in them at times - and I mean devices, not just people.
    Someone else told me (reputable source) that channel bonding is not an option when on 802.3af power. Makes sense, actually. I would never even think of bonding in the 2.4 GHz range for obvious reasons, but up in the 5GHz range it is a definate possibility in these buildings. Seems to be that we might be shooting ourselves in the foot by not using 802.3at power in these buildings.
    If channel bonding is disabled and the upper two MCS rates (using 800ns guard interval) of 117 and 130 are disabled, then I'm looking at maximum MCS rate of 104 Mbit/s compared to 270 Mbit/s with 802.3at with channels bonded in the 5GHz range.

  • Short Leave Config scenario

    Hello Experts,
    I have an issue regarding Short Leave[Paid] configuration. My actual scenario is, i have to deduct salary of half day on Short leave if it goes up on 3 leaves in a month. In detail, If an employee comes late 3 times in a month then, its half day salary should be deducted.
    I have Created Short leave[Paid] and made whole config as normal Leave.  but i need above scenario to be mapped So, plz can any one help me, how to map it..?
    -jagdish

    Hi,
    Another workaround - This can be possible by employing the condition in the User Exit. The User exit should fetch the condition
    For BUKRS = " Company Name" or For Personnel Area - WEKRS
            A)    For  BEGDA =01.01.XXXX & ENDDA = 31.12.XXXX
                    If SATZA (P10 - Infotyp 2011) >   SOBEG (IT 0007 - Planned Working Time) 
                           OR
                    If SATZA - SOBEG <> IS NOT EQUAL TO ZERO, more than three times in the month
                   System should throw an error.
                   The exit will end there without checking further entries
           SATZA  - Field which captures Clock In Entry
           SOBEG - Field which stores Planned Working Time - ( Pls chk your scenario-- If its flexitime then this field will differ. )
    Assuming the scenario is positive Time Management.
    Hope this should work

  • Cisco 2950 switch config issues

    WOOHOO that worked!  Have been on another site for a week trying to get this done.
    Now, how do I change the default SSH port from 22 to the port I want?

    Hello,I have a Cisco 2950 switch that I am trying to get working correctly. I want to be able to make console and SSH connections, but not Telnet.
    Texten!config tusername admin secret Pa55w0rden secret Pa55w0rd!line con 0password Pa55w0rdlogin local!line vty 0 4password Pa55w0rdlogin localtransport input ssh!hostname GEMSWI0001ip domain-name domain.localntp server 192.168.217.10!crypto key generate rsa2048username admin priv 15 secret Pa55w0rdaaa new-model!service password-encryption!ip http serverip http port 65410!!vlan 128name Officeint vlan128ip address 192.168.128.254 255.255.255.0shut!vlan 217name GEMint vlan217ip address 192.168.217.254 255.255.255.0shut!vlan 999name GEM-Adminint vlan999ip address 192.168.255.251 255.255.255.248no shut!int fa0/47description GEMCON0000-1switch access vlan 999switchport mode accessswitchport...
    This topic first appeared in the Spiceworks Community

  • WCS and WLC versions for Cisco 3600 WAP

    Hi,
    I got a few Cisco Aironet 3602i. The minimum WLC version to support these is 7.1.91.0. I am planning to upgrade to 7.2.103.0. The minimum WCS version to support these WAP is 7.0.220.0 and the next available 7.0.230.0. Checking the release notes for both of these WCS versions, there is no mention of support for WLC versions listed above.
    http://www.cisco.com/en/US/docs/wireless/wcs/release/notes/WCS_RN7_0_230.html#wp152663
    Am I missing something here ? What versions would be required on WCS and WLC to make all the three entities (WLC, WCS, WAP) inter-operable ?
    Thanks,
    Regards, Rashid.

    Thanks Scott.
    Table-5 from your link indicates WCS 7.0.230.0 support for WLC 7.1.91.0, although release notes for WCS fails to mention this. I think thats the only option in the our existing WCS based network then. Other option being to upgrade to NCS.
    The NCS page http://www.cisco.com/en/US/products/ps6305/index.html indicates it will be offered to existing WCS customers when releases. Would we be required to pay for the product or both product and licenses or none ?

  • Can Cisco 1041N WAP Be Configured as a Stand-alone device

    I'm out at a remote site and we've been futzing with configuring this to be the site's WAP.  But it's looking like it's
    meant to only be used in conjunction with a central controller.  Is there any way to have it work like a stand-alone
    device like the good old 1200 (which I am missing very much at the moment).

    According to the Cisco Software Download Centre, you can load autonomous IOS into the 1040 AP.
    Products
    Wireless
    Access Point
    Cisco Aironet 1040 Series
    Cisco Aironet 1040 Series Access Point
    IOS Software
    Follow the proceedure below to convert the AP from CAPWAP to Autonomous IOS.
    Using a TFTP Server to Return to a Previous Release

  • Cisco 1252 agn

    we have 1252 agn Wireless and D-Link Range Booster N Clients. I tried all but could not enable N on Access point. and clients always show connected with 54 mbps. please help me to configure N on Access Point

    Look at this thread, it tells you what you need to do on the Cisco side of things. Hope this helps.
    You need to set the power and the channel before you can enable the 40mhz channel width.
    Use one of these for above 40mhz:
    36,44,52,60,100,108,116,132,149,157
    Use one of these for below 40mhz:
    40,48,56,64,104,112,136,153,161
    http://forums.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Wireless%20-%20Mobility&topic=General&CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.2cc140a7/0#selected_message

  • PoE auto switchover with Cisco 1252 Access Point.

    Dear All
    I have a network for Managed Wireless using Cisco. This is a new network for me.
    I am in problem with Cisco Access Point 1252. My AP's are connected to a PoE Switch. And Cisco AP's are also connected Powered with also Power Adapter with UPS backup.
    But problem is if I disconnect power source of AP Power Adapter , AP is not getting up with PoE. PoE is up only when POWER PLUG of AP ADAPTER is physically pulled out from Socket.
    Question is if it is possible to make automatic Failover by PoE when Power source of AP ADAPTER is down ?? I mean no need to PULL OUT  POWER PLUG of AP ADAPTER.
    Waiting for your rely.
    It is very urgent .
    Thanking You
    Subrun.

    Hi Suburn,
    1- yes it is possible to do failover without unlupping the cable of AC adapter. When power on ACS adapter is off, then the faiolver happens.
    2- with regards to POE, if your switch supporting enhanced POE?
    Powering the Aironet 1250 Series Access Point with Cisco Enhanced PoE
    Cisco  Enhanced PoE was designed for customers who want to install new  PoE-enabled technologies that require greater than 15.4W per port to  function at full capability, such as wireless technology based on the  IEEE 802.11n standard. Cisco Enhanced PoE provides the full power  requirements for dual-radio modules and eliminates the need to run an  additional cabling drop or insert a separate power injector. Support for  Enhanced PoE is currently available on a variety of Cisco Catalyst® switching platforms. For more information on Enhanced PoE, visit http://www.cisco.com/en/US/prod/switches/epoe.html.
    Serge

  • Will WLCS work with Cisco 1231G WAPs? Along with 1552s?

    Have a partner with a client that has 1231Gs installed and wants to add a WLCS. Will that device control those WAPs? The partner is adding LAP1552LWs. Will they play together?
    Thanks - Art

    Hi Art,
    This is the Cisco Small Business Support community. The WLCS and 1231G are not supported in this community. Maybe you can find your answer here: http://www.cisco.com/en/US/products/ps6366/prod_configuration_examples_list.html
    Thanks,
    Cindy Toy
    Small Business Support Community Manager

Maybe you are looking for

  • Vendor open item - clearing - URGENT !

    H

  • Any status change on Entourage attchment corruption??

    Like many others, I ran into a problem with sending email attachments using Entourage when Tiger first came out... I haven't heard anything in a while about that topic... I did a quick search and didn't see any recent, pertinent posts... Does anyone

  • SolMan Installation Question

    Hi, I am trying to install Solution Manager 7.0 Installation fails in the step "Installing Minimal Configuration" after starting J2EE server I found an OSS note: 1094628 similar to this situation. But it didnt solve my problem. Can anyone please thro

  • SAP XI 3.0 Same source for different target in std Value mapping function

    Hi, We have replicated 4 value mapping entries from R3 to XI having the same Context , Agency , Schema and value for source, but each of the 4 values has the same Context and Agency but different Schema and Value respectively. To illusstate : Source 

  • Where are fIle type / MIME preferences?

    I have run into a bit of a problem. I can't force Safari to download a certain type of file instead of trying to view it as text. There is a Flash-site that links to a nice file I want to download. The file is "rare" and possible misunderstood by the