Cannt connect to WPA2-AES encrypted wifi

there is no issue with a WEP wifi. i googled this problem and none of them solved my problem. i updated IOS to 6.1.2. i reset my phone. however, it still does not work.
thanks in advance

Try http://archpi.dabase.com/#wireless. It worked like a charm for me with RPI2 + http://www.amazon.co.uk/Andoer-Wireless … B008IZQCGK which has the same chipset and it's using kernel module 'rt2x00' https://wireless.wiki.kernel.org/news/2011-07-22. USB ID: 148f:5370.
Last edited by phedoreanu (2015-04-25 22:35:28)

Similar Messages

  • Accept Certificate when connecting to an SSID with WPA2-AES encryption.

    When I try to Connect my Iphone to an SSID with WPA2-AES encryption,i need to accept the certificate and gets authenticated.When i switchover to different SSID and reconnect again to the same WPA2-AES SSID i do not get the Certificate accept page.
    When i click on the Forget Network and deisconnect from the SSID and re-connect again,i will be prompted to acept the certificate.Is this a normal behavior in Iphone.
    Any suggestions would be greatly appreciated.
    Thanks and regards,
    Sendhil Balakrishnan

    Hi
    with the config i have i seem to be able to login using either tkip or aes, but i don't think i have got mixed mode configured on the AP so it should only accept WPA2-AES encryption but it also accepts TKIP making me believe something is configured incorrectly.
    should i change anything in the config on the AP to only allow WPA2-AES encryption?
    many thanks
    rogier

  • WPA2 Aes encryption on cisco 1121G AP

    hi
    i wanted to increase the security on my 1121G accesspoint by enabling wpa2 with aes encryption. in a test environment i set this up and i configured my wireless client to connect, my wireless client (ibm thinkpad t42p with 11a/b/g Wireless LAN Mini PCI Adapter II has the ability to either select WPA or WPA2 and whether you use TKIP or AES. i selected WPA2 and AES enter the encryption key which i had entered on the AP and i connected,
    i change the settings on the client to WPA and TKIP and entered the same encryption key and i managed to connect as well, which puzzles me, when i enter an incorrect encryption key it won't associate.
    is this normal behaviour or do you think i have configured something incorrectly on the 1121G AP?
    i have attached my config and have removed some personal data.
    many thanks
    rogier

    i have finally figured it out, it is the windows client or mac clients being very smart, if you configure your windows client to use WPA instead of WPA2 and select TKIP instead of AES encryption somehow it figures out this is incorrect and automatically sets the WPA to WPA2 settings and changes TKIP to AES encryption, i am amazed, i finally figured it out when a windows machine which did not have the windows patch to allow it to connect to WPA2 could not connect, only after installing the WPA2 patch would it connect. in the AP log it always showed as logging in with the WPA2 EAS encryption.
    i guess windows xp is a bit smarter than i originally thought

  • Connect to WPA2-AES network

    Hello,
    I don't manage to connect my MBP to a WPA2 network with AES encryption which needs also protected EAP. In fact I don't even find an option about the encryption mode under Leopard.
    If anyone has an idea about what steps I should try I would be very grateful.
    Thank you in advance

    I think your problem is using the "enterprise" login setting. Try using just WPA2 Personal or WPA Personal (NOT enterprise) when logging in wirelessly. Then just type in the passphrase and it should work.

  • WPA2 AES encryption Key Sizes

    Hi all,
    Just looking at the AES standard, or wiki of it
    http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
    It mentions that AES supports the following (in the notes just at the bottom of the web page)
    Key sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128, 192, and 256-bit key sizes are specified in the AES standard.
    Block sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128-bit block size is specified in the AES standard.
    What does the WLCs use for an AES key size when you enable a WPA2 policy with AES encryption?
    Many thx
    Ken

    128 bits was supported on the autonomous code, so I'm sure the LWAPP solution also uses 128 bits with three possible key lengths 128, 192 and 256 bits.

  • NetworkManager Won't Connect to WPA2 Enterprise Encrypted Network

    I decided to switch back to using NetworkManager instead of wicd as my wireless protocol because I like how NetworkManager has a Gnome 3 applet and GUI that I can easily use to connect to wireless networks. Here at university, the "main" wireless network is WPA2 with PEAP Enterprise-level encryption. However, I've been unable to connect to that network through the NetworkManager GTK GUI. When I open up the network settings window, I can see a list of all available networks (with the "main" network being listed), however when I go to click on it to connect, it won't let me. The program won't try to connect or anything.
    I'm using an Intel wireless card that I KNOW can connect to network (as it worked in wicd), however it won't now. And just in case I'm forgetting something, my current daemon's array is:
    DAEMONS=(syslog-ng hwclock dbus networkmanager !netfs @gdm @crond @httpd @cupsd dropboxd)
    Am I missing something here? Thank you for any and all help, and if I'm leaving out information, please let me know and I'll try to provide as much information as possible.
    SOLVED:
    I simply entered in all of the information by hand, and NetworkManager connected easily. I'll just submit this as a bug report somewhere.
    Last edited by zcdziura (2011-10-14 18:38:48)

    I've been connecting through wifi-menu without problems since I installed Arch. As for nmcli, it gives me the following error:
    [ralph@AnarchBox ~]$ nmcli dev wifi con AnarchNet password **********
    nmcli: error while loading shared libraries: libnm.so.0: cannot open shared object file: No such file or directory
    I then checked libnm-glib, and it was not installed, even though it's a dependency for networkmanager. I still couldn't connect through nmcli, so I checked the other dependencies, and dhclient, iproute2 and libmm-glib were also missing. I installed them, and I still have the same problem I started with, both with nm-applet and nmcli (nmcli will just try to connect and then the nm-applet window asking for a password pops up, then tries to connect again and repeats).
    Last edited by ralph_13 (2015-02-15 15:29:54)

  • Has anyone succeeded to connect on WPA2 Enterprise personal wifi and used AirPlay?

    I have a ATV 2 and i has been trying to connect to the wifi of my college.. does anyone succeded? I have filled out the options and it says it succeded to install it trough Apple Configurator but when i plug it in to the TV it says it offline.. I also tried to let it be connected to a hotspot from my iPhone while i installed it on my Mac..
    I updated for the last version - 6.0.2 i believe..
    help is pushiated thx

    They can add the MAC address of the device to their allowed list of devices on the network so that no login is required.  Whether they will do this or not is a completely different matter.
    If they will not, then the other option is to see if they will allow you to connect a router to their network, essentially creating your own personal network inside the schools network.    

  • Ipad2 dropping connection with WPA2

    I recently changed my FIOS connection to WPA2, and my Ipad 2 keeps dropping connection after a few min of play.  I have no issues with my Ipad 1, Iphone, and Itouch connecting to it. It seems to only happen with the Ipad2.  My wireless is set up with WPA2 AES encryption using the standard FIOS router.  It is not a distance from router issue either.  I have been right next to the router with all the devices and still only have the issue with the Ipad2.  I restarted the router, deleted the connection and reconnected to the router also. 

    IPad dropping WiFi every few seconds after updating iOs to version 5.x
    I have the same problem with my iPad 2. It was working fine when my iOS was v.4.3.3. After updating the iOs to version 5.0.1, I kept dropping my WiFi & Internet signal. I am using WPA2, and my SSID is OFF (does not broadcast). 
    To solve the problem, I updated iOs to v5.1. Same problem occurred. I tried using the OpenDNS as suggested.. Did not work too. WiFi stays on for 5-10 seconds before saying signal was lost. Tried to log on again - iPad replied that I cannot join the network. Tried soft & hard reset, forgetting network settings, resetting all network Setting, etc - still nothing works.
    Finally, out of frustration, I turned ON my router's SSID (broadcasting openly). Guess what? My iPad WiFi is working perfectly without any dropped connection. 
    Please try this quick solution. It may just fix your problems. I realized that this solution may be effective for some iPad users out there.  But there is a chance it may not work with others (I tried almost all suggestions in other forums - ranging from updating the wireless router firmware, using an OpenDNS, doing a soft & hard reset of the iPad, etc. Still, nothing worked for my iPad - except this simple SSID setting). Hopefully, this additional solution might help someone. Good luck :-)

  • Unable to connect to a Wifi WPA2 AES network

    Hello
    I have an issue to connect to a Wireless WPA2 AES network. I am using an iPhone 4 with iOS 6.0.1
    Is that a  known issue?

  • Unable to connect to Wi-Fi connection using WPA2 PSK authentication and encryption type TKIP

    I was referred to here from this thread at the Windows Insider Program: http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_web/unable-to-connect-to-wi-fi-connection-using-wpa2/07bae1ed-c7fb-4f85-9d26-5549cc23e57a?msgId=2eb70420-fe35-494b-a13d-dcacd4d55eb9&rtAction=1426697691002
    My issue is copy/pasted below:
    Original Title: TKIP selection in WiFi network settings
    I have a workplace WiFi connection using WPA2 PSK authentication and encryption type TKIP.
    On the machine I used to test Windows 10, I had a previous installation of Windows 7 professional which connected to my workplace WiFi using the above settings. After installing Windows 10, my workplace wifi settings were imported and worked fine.
    Windows 10 had a system crash, and since I had deleted my previous windows installation, I performed a complete reinstall of Windows 7. However, when I went to install Windows 10 again, I had not taken the time to set up my workplace Wifi on Windows
    7 before installing Windows 10. As a result, I had to set up my workplace wifi as a new connection in Windows 10.
    When going to set up the wifi connection, the encryption type was grayed out, but appeared to default to AES. Searching the internet suggested that Windows 8.1 did not need a encryption type selected, because Windows could automatically determine
    if it was TKIP or AES, hence why the option to select encryption type was grayed out. However, after completing the setup of my workplace wifi, Windows 10 could not connect to my workplace wifi. After restoring Windows 7 with a factory reset, and setting up
    the workplace wifi (the encryption type selection was not grayed out and I manually selected TKIP encryption), my workplace wifi was working again.

    I was referred to here from this thread at the Windows Insider Program: http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_web/unable-to-connect-to-wi-fi-connection-using-wpa2/07bae1ed-c7fb-4f85-9d26-5549cc23e57a?msgId=2eb70420-fe35-494b-a13d-dcacd4d55eb9&rtAction=1426697691002
    My issue is copy/pasted below:
    Original Title: TKIP selection in WiFi network settings
    I have a workplace WiFi connection using WPA2 PSK authentication and encryption type TKIP.
    On the machine I used to test Windows 10, I had a previous installation of Windows 7 professional which connected to my workplace WiFi using the above settings. After installing Windows 10, my workplace wifi settings were imported and worked fine.
    Windows 10 had a system crash, and since I had deleted my previous windows installation, I performed a complete reinstall of Windows 7. However, when I went to install Windows 10 again, I had not taken the time to set up my workplace Wifi on Windows
    7 before installing Windows 10. As a result, I had to set up my workplace wifi as a new connection in Windows 10.
    When going to set up the wifi connection, the encryption type was grayed out, but appeared to default to AES. Searching the internet suggested that Windows 8.1 did not need a encryption type selected, because Windows could automatically determine
    if it was TKIP or AES, hence why the option to select encryption type was grayed out. However, after completing the setup of my workplace wifi, Windows 10 could not connect to my workplace wifi. After restoring Windows 7 with a factory reset, and setting up
    the workplace wifi (the encryption type selection was not grayed out and I manually selected TKIP encryption), my workplace wifi was working again.

  • WPA2 University's WIFi Network Connection. Need He...

    Hello, I am trying to connect ot my university's WIFi network form my 5800. These are the deatils provided by my uni. I tried many times to connect to their network without any luck. Could you please help me to setup my 5800.
    Network name or SSID: AccessKings (Important note: The name is case sensitive.)
    Network authentication: WPA2
    Encryption: AES
    Protocol for 802.1X authentication: Protected EAP (PEAP)
    PEAP properties:
    Validate the server's certificate: Yes (The certificate is issued to radius.kcl.ac.uk)
    Authentication method: EAP-MSCHAPV2
    PEAP outer identity: Leave blank
    Username or identity: Your King’s username, e.g. rsvp1234
    Password: Your King's password
    Domain: Leave blank
    Could you please help me to setup my 5800.
    Thanks.

    @kintesh
    Have you seen this thread?
    /t5/Connectivity/Nokia-5800-mschapv2-Support/m-p/4​30134/message-uid/430134/highlight/true#U430134
    Happy to have helped forum with a Support Ratio = 42.5

  • HP Wireless Printers cannot connect to WPA2-secured WiFi networks with Cisco/Meraki WAPs

    In the last two months, I've had the displeasure of working with two very different HP printers and attempting to make them work on a WPA2-secured wireless network.  All attempts to authenticate fail with "invalid phassphrase". 
    I'm not the first person to encounter this, it's a problem with many different HP wireless printers (I just happen to have physical access to the OfficeJet Pro 8610 & Deskjet 3511). 
    My equipment is a Cisco ASA 5505 Firewall running ASA 9.1x & Cisco Aironet 1142 running IOS 15.3.x. 
    What does work on the WPA2/AES SSID:  Apple MacBook Air running OSX 10.10.2, Three Windows-Based laptops running Windows 8.1 Update 1, an iPhone 5s, Three Windows Phone 8.1 devices, Roku 2, PlayStation 4, PlayStation 3, Sharp Aquos TV, Amazon Streaming Stick, and an Android Tablet (Jellybean).  Basically, everything. 
    What does not work on the WPA2 network:  OfficeJet Pro 8610 & Deskjet 3511.
    To test the theory there is a problem with HP's implementation of WPA2 with regard to Cisco Aironet IOS, I built out a second SSID that only works in WPA/TKIP mode.  This solution works.  Both HP printers will join the WPA/TKIP network.
    So, I'm able to demonstrate there is a certain connectivity issue.  When i look at AAA Debug on the WAP's console, I can observe the HPs attempt to authenticate "Bind I/F" on the WPA2 SSID, however they do not achieve authentication and do not pass the AAA phase.  However, on the WPA SSID, they bind and authenticate successfully. 
    To help illustrate this, here is my WAP running config.  It's about as simple as it can get.  There is no relevant MAC filtering or ACLs bound to any interface.  Noting that I have an ACL on remote access to the WAP (i.e. Locked down to SSH, disabling telnet).  The main point being that the ASA firewall is not a factor in this problem as the issue is at the WAP before WPA2 authentication can complete, therefore the printers never reach the network / when the printers connect to the WPA network, the operate fully & correctly. 
    If anyone at HP can indicate why this particular config is somehow improper or broken, that would be fantastic.  There should be no reason why Cisco / Meraki WAP owners have to lower wireless encryption standards just for a printer, be forced into wired, create separate SSIDs with lower encryption specifically for a device. 
    Building configuration...
    Current configuration : 6064 bytes
    ! Last configuration change at 12:46:47 UTC Fri Aug 20 1993 by admin
    version 15.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname 10-10-50-1
    logging buffered 1024768
    logging rate-limit console 9
    aaa new-model
    aaa authentication login default local
    aaa authorization exec default local
    aaa session-id common
    no ip source-route
    no ip cef
    ip domain name freedom.local
    dot11 syslog
    dot11 vlan-name inside vlan 50
    dot11 vlan-name inside-wpa-only vlan 70
    dot11 ssid inside
       vlan 50
       band-select
       authentication open
       authentication key-management wpa version 2
       mbssid guest-mode
       wpa-psk ascii 7 xxxxxx
       information-element ssidl
    dot11 ssid inside-wpa-only
       vlan 70
       band-select
       authentication open
       authentication key-management wpa
       mbssid guest-mode
       wpa-psk ascii 7 xxxxxx
       information-element ssidl
    dot11 band-select parameters
       cycle-count 3
       cycle-threshold 200
       expire-supression 20
       expire-dual-band 60
       client-rssi 75
    dot11 wpa handshake timeout 500
    dot11 network-map
    username ADMIN privilege 15 secret 5 xxxxxx
    ip ssh version 2
    bridge irb
    interface Dot11Radio0
     no ip address
     no ip route-cache
     encryption vlan 50 mode ciphers aes-ccm
     encryption vlan 70 mode ciphers aes-ccm tkip
     ssid inside
     ssid inside-wpa-only
     antenna gain 0
     mbssid
     speed  basic-1.0 basic-2.0 basic-5.5 basic-11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
     channel 2412
     station-role root
     l2-filter bridge-group-acl
    interface Dot11Radio0.50
     encapsulation dot1Q 50 native
     no ip route-cache
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface Dot11Radio0.70
     encapsulation dot1Q 70
     no ip route-cache
     bridge-group 70
     bridge-group 70 subscriber-loop-control
     bridge-group 70 input-address-list 700
     bridge-group 70 output-address-list 700
     bridge-group 70 spanning-disabled
     bridge-group 70 block-unknown-source
     no bridge-group 70 source-learning
     no bridge-group 70 unicast-flooding
    interface GigabitEthernet0
     no ip address
     no ip route-cache
     duplex auto
     speed auto
    interface GigabitEthernet0.50
     encapsulation dot1Q 50 native
     no ip route-cache
     bridge-group 1
     bridge-group 1 spanning-disabled
     no bridge-group 1 source-learning
    interface GigabitEthernet0.70
     encapsulation dot1Q 70
     no ip route-cache
     bridge-group 70
     bridge-group 70 spanning-disabled
     no bridge-group 70 source-learning
    interface BVI1
     mac-address xxxx.xxxx.xxxx
     ip address 10.10.50.1 255.255.255.0
     no ip route-cache
    ip forward-protocol nd
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip route 0.0.0.0 0.0.0.0 10.10.50.2
    logging history size 100
    access-list 111 permit tcp any any neq telnet
    bridge 1 route ip
    line con 0
     access-class 111 in
    line vty 0 4
     access-class 111 in
     length 0
     transport input ssh
    line vty 5 15
     access-class 111 in
     transport input ssh
    end

    I get the same behavior with a laserjet m451nw. I need to enable tkip to get the printer working, it doesn't support pure aes-ccm (every other device here supports pure aes-ccm, even cheap ones), although it's advertised as working.
    The following snippet of config works, but I still think it should work without the tkip "hack".
    dot11 ssid whatever
    vlan 1
    band-select
    authentication open
    authentication key-management wpa version 2
    interface Dot11Radio0
    encryption vlan 1 mode ciphers aes-ccm tkip

  • WPA-TKIP WPA2-AES Connection speed

    Hi,
    My customer uses controller based wireless network. There is a connection speed problem between two SSID's. First SSID uses WPA(TKIP+AES) and WPA2(TKIP+AES) encryption method and dot1x authentication method. Second SSID uses open authentication (this is a guest SSID)
    802.11 a/n/ac is enable on WLC and client can connect with these methods. But clients connect to the first SSID with 802.11 b/g (54 Mbps) and connect to the second SSID with 802.11 a/n/ac. Customer wants to know why our clients connect with low speed to first SSID even if a/n/ac is enable.
    Sometimes WPA-TKIP encryption methods can reduce the connection speed. Do you have any idea about that and official document about this problem?
    Thanks,
    Burhan,

    TKIP and AES are two different types of encryption that can be used by a Wi-Fi network. TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it.
    AES stands for “Advanced Encryption Standard.” This was a more secure encryption protocol introduced with WPA2, which replaced the interim WPA standard. AES isn’t some creaky standard developed specifically for Wi-Fi networks; it’s a serious worldwide encryption standard that’s even been adopted by the US government. For example, when you encrypt a hard drive with TrueCrypt, it can use AES encryption for that. AES is generally considered quite secure, and the main weaknesses would be brute-force attacks (prevented by using a strong passphrase) and security weaknesses in other aspects of WPA2.
    The “PSK” in both names stands for “pre-shared key” — the pre-shared key is generally your encryption passphrase. This distinguishes it from WPA-Enterprise, which uses a RADIUS server to hand out unique keys on larger corporate or government Wi-Fi networks.
    In summary, TKIP is an older encryption standard used by the old WPA standard. AES is a newer Wi-Fi encryption solution used by the new-and-secure WPA2 standard. In theory, that’s the end of it. But, depending on your router, just choosing WPA2 may not be good enough.
    While WPA2 is supposed to use AES for optimal security, it also has the option to use TKIP for backward compatibility with legacy devices. In such a state, devices that support WPA2 will connect with WPA2 and devices that support WPA will connect with WPA. So “WPA2″ doesn’t always mean WPA2-AES. However, on devices without a visible “TKIP” or “AES” option, WPA2 is generally synonymous with WPA2-AES.
    WPA and TKIP compatability options can also slow your Wi-Fi network down. Many modern Wi-Fi routers that support 802.11n and newer, faster standards will slow down to 54mbps if you enable WPA or TKIP in their options. They do this to ensure they’re compatible with these older devices.
    In comaprison, even 802.11n supports up to 300mbps — but, generally, only if you’re using WPA2 with AES. Theoretically, 802.11ac offers theoretical maximum speeds of 3.46 Gbps under optimum (read: perfect) conditions.
    In other words, WPA and TKIP will slow a modern Wi-Fi network down. It’s not all about security!

  • IPad WiFi works only with WPA/TKIP, not WPA2/AES

    My iPad (like so many others) stopped connecting to my Linksys WRT54G router (which like everyone else's connects fine with every other device, including non-iOS 4 iPhones). The whole reset/restart/restore dance with the iPad/router/cable modem was performed to no avail. By sheer desperation, security protocols were changed, and that's what finally worked.
    The protocol to the rescue was WPA/TKIP, curiously enough. (When security is completely disabled ("Open"), the iPad also connects, perhaps expectedly.) The culprit is WPA2/AES (even AES+TKIP). Any iteration of WPA2/AES ends up blocking the iPad from getting the appropriate IP address via DHCP. Once I changed to WPA/TKIP, everything's been rock-solid and fast.
    (The only times WPA2/AES worked was when the iPad was first used for a couple days, and a couple days after switching back to WPA2/AES when it started working with WPA/TKIP. Since then, switching back to WPA2/AES no longer works, even temporarily.)
    Any idea why initially WPA2/AES worked, and then suddenly stopped?

    Ralph Landry1 wrote:
    That is a very interesting question ... [involving] the combination of the router and the iPad and their respective implementations of the AES encryption algorithm. The AES algorithm is considerably more complex than TKIP. Why some have problems and not others has to be related to the router and its implementation and the Apple implementation.... t works fine for me connecting with [both] a Verizon FiOS (Actiontec) router [a]nd ... an AirPort Extreme. But there have been a number of posts recently about problems with Linksys and Belkin connectivity.
    Tell me about it. I'd been pulling my hair out prior to "discovering (by accident," as George Costanza would say) that WPA/TKIP fixed the problem, and seems to be working fine and fast. Now I'm just academically frustrated (better than actually frustrated) wondering why WPA2/AES is so problematic +with this particular trifecta+ (my iPad, my Linksys router, and WPA2/AES).
    Bottom line is there is probably not an easy solution ... and since you do have a strong security protocol that works, keep using it. Very strange that there would be a change in connectivity after a few months, though. Old engineering philosophy, if it ain't broke, don't fix it. If you have something that works, stick with it for now.
    Actually, WPA2/AES worked on two (short but notable) occasions:
    a) for two days when I first unpacked the iPad, and
    b) for two days when I switched back to WPA2/AES upon discovering WPA/TKIP fixed the issue.
    So it wasn't two months, which makes more sense. I agree with you that I'm not touching this arrangement for now. What I did have to do was change over the other devices (PCs, Wii's, TiVo's) that didn't automatically adjust over to WPA/TKIP. (To its credit, the iPhone did that on the fly.) Going through each device hurt a little, knowing I was using a less-than-optimal protocol for just one cranky device at expense of every other one--but of course I'd rather everything play nice than be necessarily cutting edge. (It's not like I'm the Pentagon or anything here.)
    But also give feedback to Apple:
    http://www.apple.com/feedback/ipad.html
    Done and done. And thanks for a great and reassuring explanation.
    Message was edited by: TashTish

  • How to config Autonomous AP 1242/1252 the WPA2 and AES encryption

    Hi Guys,
    Do you know how to configure the autonomous AP1242 and AP1252 use new authentication way: WPA2 and encryption as AES to support 11n ?
    right now, our AP only configure the SSID as WH001 as network access.
    dot11 ssid WH001
       authentication open eap ea1
       authentication network-eap ea1
       accounting ac1
    How about the new SSID WH003 (new 11n)
    dot11 ssid WH003
      authenticaion ?
      authentication?
      account?
    interface Dot11Radio0
    no ip address
    no ip route-cache
    encryption mode wep mandatory
    encryption mode? 
    ssid WH001
    ssid WH003
    channel 2437

    Well the 1242 doesn't support 802.11n. Here is a link to configure 802.11n on an ap that supports 802.11n like the 1252.
    http://www.cisco.com/en/US/docs/wireless/access_point/12.4.25d.JA/Configuration/guide/scg12.4.25d.JA-chap6-radio.html
    Here is a link that shows how to setup WPA2/AES which is required for 802.11n, besides open authentication.
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008054339e.shtml
    Sent from Cisco Technical Support iPhone App

Maybe you are looking for

  • Satellite P200D-127 - Where can I get a new mainboard?

    Hi, I have a Satellite P200D-127 (Part Number : PSPBLE-02100LEN) which has a knackered motherboard. I have a blank screen when I turn on the laptop. All of the lights come on and I can hear the hard drive whizzing into life but nothing on the screen.

  • AWR & GATHER_STATS_JOB stats jobs difference

    10gR2 version What the difference b/w Optimizer stats gathered by GATHER_STATS_JOB and stats collected by AWR, and what are areas of stats collections for both

  • Schedule Webi report to CSV - text qualifier

    Hi We are running the latest version of Business Objects 4.0 SP04 (FP3) with Patch 1. I am having a problem scheduling a Webi report to CSV format. The text qualifier option only allows the choice of ' (single quote). Not only is the text qualifier o

  • IPhoto won't export photos without restarting iPhoto

    i'm running snow leopard and the newest update of iPhoto '09. I can export photos just fine, but if I try and export photos a 2nd time, the progress bar from the previous session is still there and I can't choose my export options (nor can I do anyth

  • Javascript in Quiz

    I am developing exams in Captivate that includes a lot javascript. The problem is that there is not too much documentation about it. Therefore, I have a lot problems. My problem in the time being is using javascript in Question Slides. More specifica