What does the Cisco 1242AG AP offer me?
This Cisco 1242 wireless access point (AP), designed for business-grade users, is ideal if you have a lot of traffic and you need reliability and some advanced features. For a business, I would never install any consumer-grade AP unless I were looking for trouble. The reason is that those consumer-grade APs (the ones you can buy at your local electronics store) just don't have the capabilities, the reliability of connections, the troubleshooting, or the throughput to do what you need them to do.
Here is a photo of the 1242AG:
Here is a photo of the front of the AP:
On the front of the AP are the two antenna connectors for the 2.4Ghz network, with the right connector being the primary. On the back are the connectors for the 5Ghz network. These antennas can be bought separately and are required only if you want to extend the range in some way or do point-to-point bridging between APs. In a business network, you often want to extend or shape the wireless range, both for coverage and security. In that case, you would want to investigate and use the external antennas.
The 1242 offers the following:
- A, B and G wireless protocols in the 2.4Ghz and 5Ghz wireless ranges
- A long list of security protocols that you won't find in consumer-grade APs
- Intrusion detection and prevention
- Hardware-assisted AES encryption
- Locking mounting bracket and a rugged NEMA metal case
- Compatibility with Cisco's wireless management applications
- That Cisco IOS CLI look and feel that we are used to configuring (or a Web browser interface if you so desire)
You can find more specifics on these APs at the Cisco homepage for the Aironet 1242 series.
Configuring the 1242 wireless AP
Here are the steps I took to get my wireless AP functioning on my network:
1. Connect to power and LAN Ethernet
2. AP obtains IP address from DHCP server. I went to my DHCP server and found the IP address that it had obtained:
Alternatively, you can configure a static IP address on the AP using the console port, like this:
3. Point your Web browser to the AP. In my case, the DHCP-obtained IP address was 192.168.1.106. The default login (console or Web) is Cisco and Cisco (not cisco and cisco) for the username and password. Here is what I saw:
Notice how both the 2.4Ghz and 5Ghz radios show to be "down." On APs with version 12.3(4)JA and above, the wireless radio is disabled by default, and there is no SSID configured. This is for security reasons.
Also, note on the menu selections for the interface that there are options for Express Setup and Express Security. If these are available, why not use them?
4. Click on Express Setup. Notice the changes I made in the following screen. Not all of these are required. I changed the AP's name, set it to a static IP, changed the SNMP community string, and took the default of "Access Point" for both radios.
Next, I clicked Apply. I was redirected to the new IP address of the AP and I had to log in again.
5. Next, I clicked on Express Security and set the SSID, the SSID to be broadcast, and 40bit WEP encryption with a static key (basic, I know -- but just an example).
6. There are two important things still left to do -- change the admin password and enable the radios. To enable the radios, I clicked in Network Interfaces, on the left. In my case, I was only using the 2.4Ghz radio so I clicked on Radio0-802.11G, then on the Settings tab. I clicked on Enable for the radio and took all the other default settings.
At the bottom of the page, I clicked "Apply."
7. Finally, let's change the admin password so that no one else can get into our AP. To do this, I clicked on Security on the left hand side, then Admin Access. From here, I changed the default Authentication password and clicked Apply. I had to reauthenticate to the AP.
Then I created a new account called Admin with a secure password, and Read-Write capability (clicked Apply). After that, I deleted the default Cisco account (clicked Apply).
Here is what it looked like:
Note that we still have a single global password for all users. You may want to change this so that individual users will have their own passwords.
8. At this point, I could see the wireless network from my Windows computer and could successfully connect to it using the configured WEP key. My computer received a DHCP IP address from my DHCP server.
About the author:
David Davis (CCIE #9369, CWNA, MCSE, CISSP, Linux+, CEH) has been in the IT industry for 15 years. Currently, he manages a group of systems/network administrators for a privately owned retail company and authors IT-related material in his spare time. He has written more than 100 articles, eight practice tests and four video courses and has co-authored one book. His Web site is HappyRouter.com.
This was first published in February 2007