Autonomous Access Point Configuration via CLI
Not every wireless deployment uses a
Wireless LAN Controller. In small
offices, branch sites, or environments where centralised management
is unavailable, a standalone (autonomous) Cisco AP
operates independently — storing its own configuration in local
flash, managing its own radios, and requiring direct CLI or GUI access
for administration. Unlike a
lightweight AP that
relies on a WLC for all intelligence, an autonomous AP runs a full
IOS image and is configured much like a router: you enter interface
configuration mode, define SSIDs with dot11 ssid, assign
security, and bridge wireless clients to the wired network through the
Bridge Virtual Interface (BVI).
This lab configures a Cisco Aironet 1142N from scratch: initial console access, hostname and credentials, BVI1 IP addressing, two SSIDs (corporate WPA2 and guest WPA2) across both the 2.4 GHz and 5 GHz radios, channel selection, and transmit power settings. Before working through this lab, ensure the switch port connected to the AP is correctly configured — see VLAN Creation and Management and Assigning VLANs to Switch Ports. For SSH hardening applied after initial access, see SSH Configuration. For environments that have scaled beyond standalone APs, compare this workflow with Configuring a WLC — Getting Started. For RF planning concepts including channel and power design, see Wireless RF Channel and Power Planning.
1. Autonomous vs Lightweight AP Architecture
Understanding where configuration lives is fundamental before touching the CLI. The two AP modes have entirely different operational models:
| Feature | Autonomous AP (Standalone) | Lightweight AP (CAPWAP) |
|---|---|---|
| Configuration storage | Local flash — full IOS config file (show running-config) |
Pushed from WLC over CAPWAP control tunnel — no local SSID config |
| Management | Direct CLI (console/SSH/Telnet) or built-in web GUI per AP | Centralised WLC GUI or CLI — individual APs have no SSID config |
| Data path | Local bridging — client frames go directly to the wired LAN port | CAPWAP tunnelled to WLC (Local mode) or local switching (FlexConnect) |
| Roaming | Basic — client must re-associate; no WLC-assisted fast roaming | WLC-assisted fast roaming with context transfer between APs |
| IOS image | Full IOS AP image (e.g., c1140-k9w7-tar.124-25d.JA2) |
Recovery image (LWAPP/CAPWAP) — most intelligence resides on WLC |
| Scale | 1–10 APs manageable; beyond that, per-AP administration is impractical | Centralised management of hundreds to thousands of APs |
| RF management | Manual — administrator sets channel and power per AP. See Wireless RF Channel and Power Planning | Automatic with WLC RRM (Radio Resource Management) — auto channel/power |
2. Autonomous AP IOS Interface Hierarchy
An autonomous AP exposes four key interface types in IOS. Understanding how they relate explains why every configuration command touches a specific interface or sub-interface:
| Interface | Physical / Logical | Purpose |
|---|---|---|
FastEthernet0 |
Physical — wired uplink to switch | The AP's wired LAN port. Connects to a switch access or trunk port. Assigned to a bridge group to link the wired network to wireless clients |
Dot11Radio0 |
Physical — 2.4 GHz radio | 802.11b/g/n radio interface. SSIDs, channel, power, and encryption are configured here. Sub-interfaces can carry 802.1Q VLAN tags for multi-SSID/VLAN deployments |
Dot11Radio1 |
Physical — 5 GHz radio (dual-band APs only) | 802.11a/n/ac radio interface. Same configuration model as Dot11Radio0 but for the 5 GHz band. Supports wider channels and higher data rates |
BVI1 (Bridge Virtual Interface) |
Logical — Layer 3 management interface | The AP's management IP address lives here. BVI bridges the FastEthernet0 and Dot11Radio interfaces at Layer 2. Assigning an IP to BVI1 gives the AP a routable management address for SSH, Telnet, and the web GUI |
Physical Wired Network (Switch)
|
FastEthernet0 ─────────────────────────────┐
│
BVI1 (bridge group 1)
│ └─ Management IP: 192.168.10.20
Dot11Radio0 (2.4 GHz) ─────────────────────┤
Dot11Radio1 (5 GHz) ─────────────────────┘
Wireless clients (Radio0 or Radio1)
│
│ associate to SSID → bridge group 1 → BVI1 → FastEthernet0 → Switch
▼
LAN / DHCP server / default gateway
3. Channel and Power Fundamentals
2.4 GHz Non-Overlapping Channels
The 2.4 GHz band is divided into 11 channels (in North America) spaced 5 MHz apart, each 22 MHz wide. This means only three channels do not overlap with any other:
| Channel | Centre Frequency | Overlap-Free | Typical Use |
|---|---|---|---|
| 1 | 2412 MHz | ✓ Yes | AP1 in a multi-AP floor plan |
| 2 | 2417 MHz | ✗ Overlaps 1 and 3 | Not recommended |
| 3 | 2422 MHz | ✗ | Not recommended |
| 4 | 2427 MHz | ✗ | Not recommended |
| 5 | 2432 MHz | ✗ | Not recommended |
| 6 | 2437 MHz | ✓ Yes | AP2 in a multi-AP floor plan |
| 7–10 | 2442–2457 MHz | ✗ | Not recommended |
| 11 | 2462 MHz | ✓ Yes | AP3 in a multi-AP floor plan |
5 GHz U-NII Bands and DFS Channels
| U-NII Band | Frequency Range | Channels | DFS Required | Notes |
|---|---|---|---|---|
| U-NII-1 | 5150–5250 MHz | 36, 40, 44, 48 | No | Indoor use, lower power limit (200 mW). Best choice for enterprise WLANs — no radar scan delay on boot |
| U-NII-2A | 5250–5350 MHz | 52, 56, 60, 64 | Yes | DFS: AP must scan for radar (weather, military) before transmitting. 60-second quiet period may apply on power-up |
| U-NII-2C | 5470–5725 MHz | 100–144 | Yes | DFS required. Higher power allowed outdoors. Wide channel selection but radar-aware delay on channel change |
| U-NII-3 | 5725–5850 MHz | 149, 153, 157, 161, 165 | No | No DFS required. Most commonly used for enterprise 5 GHz. Higher power allowed. Channel 36 and 149 are the two most common starting choices |
Transmit Power
On Cisco autonomous APs, transmit power is set using a power level index (1–8), not directly in dBm. Level 1 is the maximum configured power for that radio; each subsequent level halves the power (3 dB reduction). For background on RF power and decibels, see Antenna and RF Basics:
| Power Level | Relative to Maximum | Typical dBm (2.4 GHz, 100 mW max) | Use Case |
|---|---|---|---|
| 1 | 100% (maximum) | 20 dBm (100 mW) | Large open areas, long range needed |
| 2 | 50% | 17 dBm (50 mW) | Standard office — good coverage without excessive overlap |
| 3 | 25% | 14 dBm (25 mW) | Dense deployment — reduce co-channel interference |
| 4–8 | 12.5% and lower | 11 dBm and below | High-density environments, adjacent AP mitigation |
show dot11 interface Dot11Radio0 to see the actual
power level in dBm currently in use on your specific hardware.
Cisco IOS uses the keyword power local followed by the
level number: power local 2 sets level 2 (half power).
4. Lab Topology & Design
A single Cisco Aironet 1142N is configured as a standalone AP. It connects to NetsTuts_SW1 on an access port in VLAN 10. Two SSIDs are broadcast on both radios simultaneously: a corporate SSID using WPA2-PSK and a guest SSID using WPA2-PSK with a separate passphrase:
NetsTuts_SW1
|
Gi1/0/2 (access, VLAN 10)
|
FastEthernet0
NetsTuts-AP1 (Aironet 1142N)
BVI1: 192.168.10.20 / 255.255.255.0
Default GW: 192.168.10.1
|
┌──────────┴──────────┐
Dot11Radio0 Dot11Radio1
(2.4 GHz) (5 GHz)
Channel 6 (2437 MHz) Channel 36 (5180 MHz)
Power Level 2 Power Level 2
┌───────────────────────────────────────────────────────┐
│ SSID 1: NetsTuts-Corp │
│ Security: WPA2 / PSK / AES-CCMP │
│ Broadcast on: Dot11Radio0 AND Dot11Radio1 │
│ PSK: CorpWifi@2026! │
├───────────────────────────────────────────────────────┤
│ SSID 2: NetsTuts-Guest │
│ Security: WPA2 / PSK / AES-CCMP │
│ Broadcast on: Dot11Radio0 AND Dot11Radio1 │
│ PSK: Guest@Visit2026 │
└───────────────────────────────────────────────────────┘
| Parameter | Value |
|---|---|
| Hostname | NetsTuts-AP1 |
| Management IP (BVI1) | 192.168.10.20 / 255.255.255.0 |
| Default Gateway | 192.168.10.1 |
| Switch port | NetsTuts_SW1 Gi1/0/2 — access VLAN 10, PortFast |
| 2.4 GHz channel | 6 (2437 MHz) |
| 5 GHz channel | 36 (5180 MHz) |
| Transmit power | Level 2 (50% / ~17 dBm) on both radios |
| Corporate SSID | NetsTuts-Corp — WPA2/PSK/AES |
| Guest SSID | NetsTuts-Guest — WPA2/PSK/AES |
5. Step 1 — Configure the Switch Access Port
Before connecting the AP, configure its switch port as an access port in the management VLAN with PortFast enabled. Autonomous APs require a single VLAN on their wired port unless trunking for multi-VLAN deployments. See VLAN Creation and Management to ensure VLAN 10 exists before proceeding:
NetsTuts_SW1>en NetsTuts_SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. ! ── Configure the AP uplink port ───────────────────────────────── NetsTuts_SW1(config)#interface GigabitEthernet1/0/2 NetsTuts_SW1(config-if)#description AP: NetsTuts-AP1 NetsTuts_SW1(config-if)#switchport mode access NetsTuts_SW1(config-if)#switchport access vlan 10 NetsTuts_SW1(config-if)#spanning-tree portfast %Warning: portfast should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, or repeaters to this port could cause temporary bridging loops. Use with CAUTION %Portfast has been configured on GigabitEthernet1/0/2 but will only have effect when the interface is in a non-trunking mode. NetsTuts_SW1(config-if)#no shutdown NetsTuts_SW1(config-if)#exit NetsTuts_SW1(config)#end NetsTuts_SW1#wr Building configuration... [OK]
6. Step 2 — Initial Console Access and Base Configuration
Connect via console cable (9600 baud). On a factory-default Cisco autonomous AP, the default credentials are username: Cisco / password: Cisco (capitalised) or no credentials at all depending on the IOS version. Establish a hostname, enable secret, and a local user for SSH before any network configuration:
ap>enable ap#configure terminal Enter configuration commands, one per line. End with CNTL/Z. ! ── Hostname ────────────────────────────────────────────────────── ap(config)#hostname NetsTuts-AP1 ! ── Enable secret (encrypted) ──────────────────────────────────── NetsTuts-AP1(config)#enable secret NetsTuts@Enable2026 ! ── Local user for SSH and web GUI ─────────────────────────────── NetsTuts-AP1(config)#username admin privilege 15 secret Admin@AP2026 ! ── Disable Telnet; require local login on VTY ─────────────────── NetsTuts-AP1(config)#line vty 0 4 NetsTuts-AP1(config-line)#login local NetsTuts-AP1(config-line)#transport input ssh NetsTuts-AP1(config-line)#exec-timeout 10 0 NetsTuts-AP1(config-line)#exit ! ── Console line ────────────────────────────────────────────────── NetsTuts-AP1(config)#line con 0 NetsTuts-AP1(config-line)#login local NetsTuts-AP1(config-line)#exec-timeout 15 0 NetsTuts-AP1(config-line)#exit ! ── Generate RSA key for SSH ────────────────────────────────────── NetsTuts-AP1(config)#ip domain-name netstuts.com NetsTuts-AP1(config)#crypto key generate rsa modulus 2048 The name for the keys will be: NetsTuts-AP1.netstuts.com % The key modulus size is 2048 bits % Generating 2048 bit RSA keys, keys will be non-exportable... [OK] (elapsed time was 3 seconds) NetsTuts-AP1(config)#ip ssh version 2 NetsTuts-AP1(config)#ip ssh time-out 60 NetsTuts-AP1(config)#ip ssh authentication-retries 3 NetsTuts-AP1(config)#service timestamps log datetime msec localtime NetsTuts-AP1(config)#service timestamps debug datetime msec localtime NetsTuts-AP1(config)#no ip http server NetsTuts-AP1(config)#ip http secure-server
no ip http server disables plain HTTP access to the
AP's built-in web GUI; ip http secure-server enables
HTTPS only. For hardening details beyond what is covered here,
see SSH Configuration and
Login
Security and Brute-Force Protection.
7. Step 3 — Assign the Management IP via BVI1
The IP address for AP management is assigned to the Bridge Virtual Interface (BVI1), not to FastEthernet0 or the radio interfaces. This is a critical difference from router/switch configuration — do not assign an IP to FastEthernet0:
! ── Static IP on BVI1 ──────────────────────────────────────────── NetsTuts-AP1(config)#interface BVI1 NetsTuts-AP1(config-if)#ip address 192.168.10.20 255.255.255.0 NetsTuts-AP1(config-if)#no shutdown NetsTuts-AP1(config-if)#exit ! ── Default gateway ─────────────────────────────────────────────── NetsTuts-AP1(config)#ip default-gateway 192.168.10.1 NetsTuts-AP1(config)#end ! ── Verify IP and reachability ──────────────────────────────────── NetsTuts-AP1#show ip interface BVI1 BVI1 is up, line protocol is up Internet address is 192.168.10.20/24 Broadcast address is 255.255.255.255 MTU is 1500 bytes Outgoing access list is not set Inbound access list is not set NetsTuts-AP1#ping 192.168.10.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms NetsTuts-AP1#wr Building configuration... [OK]
BVI1 is down in the output of
show ip interface BVI1,
the FastEthernet0 interface is not up. Check the switch port:
show interfaces
GigabitEthernet1/0/2 status on the switch — the
port must show connected. Also verify
no shutdown has been applied to FastEthernet0 on
the AP. BVI1 state follows the physical member interfaces
in the bridge group — if FastEthernet0 is down, BVI1
will be down too.
8. Step 4 — Define Both SSIDs Globally
On autonomous IOS APs, SSIDs are defined globally under
dot11 ssid [name] configuration mode. The SSID
block contains authentication type, key management, and the
WPA PSK. The SSID is then applied to radio interfaces in a
separate step:
! ── Corporate SSID definition ──────────────────────────────────── NetsTuts-AP1(config)#dot11 ssid NetsTuts-Corp NetsTuts-AP1(config-ssid)#authentication open NetsTuts-AP1(config-ssid)#authentication key-management wpa version 2 NetsTuts-AP1(config-ssid)#wpa-psk ascii CorpWifi@2026! NetsTuts-AP1(config-ssid)#mbssid guest-mode NetsTuts-AP1(config-ssid)#exit ! ── Guest SSID definition ───────────────────────────────────────── NetsTuts-AP1(config)#dot11 ssid NetsTuts-Guest NetsTuts-AP1(config-ssid)#authentication open NetsTuts-AP1(config-ssid)#authentication key-management wpa version 2 NetsTuts-AP1(config-ssid)#wpa-psk ascii Guest@Visit2026 NetsTuts-AP1(config-ssid)#mbssid guest-mode NetsTuts-AP1(config-ssid)#exit
| Command | Purpose | Notes |
|---|---|---|
authentication open |
Sets 802.11 authentication to Open System (not Shared Key) | Required even when using WPA2 — WPA2 security is at a higher layer. Shared Key (WEP-based challenge) is obsolete and insecure |
authentication key-management wpa version 2 |
Enables WPA2 (RSN / 802.11i) key management | Without version 2, the AP uses WPA1 (TKIP). Always specify version 2 for AES-CCMP / WPA2. See Wi-Fi Security for WPA2 background |
wpa-psk ascii [passphrase] |
Sets the WPA2 pre-shared key in plain ASCII | ASCII passphrases are 8–63 characters. Alternatively, wpa-psk hex accepts a 64-character hexadecimal PSK derived from the passphrase via PBKDF2 |
mbssid guest-mode |
Enables MBSSID (Multiple BSSID) and broadcasts the SSID in beacon frames | Without this, the SSID is hidden. Required when running multiple SSIDs on a single radio interface |
9. Step 5 — Configure Dot11Radio0 (2.4 GHz)
The 2.4 GHz radio interface is assigned channel 6 (2437 MHz), power level 2, the AES-CCMP cipher, both SSIDs, and bridge group membership:
NetsTuts-AP1(config)#interface Dot11Radio0 NetsTuts-AP1(config-if)#no shutdown ! ── Channel: 6 (2437 MHz) ──────────────────────────────────────── NetsTuts-AP1(config-if)#channel 2437 ! ── Transmit power: Level 2 (~17 dBm / 50 mW) ─────────────────── NetsTuts-AP1(config-if)#power local 2 ! ── Encryption: AES-CCMP (WPA2) ────────────────────────────────── NetsTuts-AP1(config-if)#encryption mode ciphers aes-ccm ! ── Attach both SSIDs to this radio ────────────────────────────── NetsTuts-AP1(config-if)#ssid NetsTuts-Corp NetsTuts-AP1(config-if)#ssid NetsTuts-Guest ! ── MBSSID — required for multiple SSIDs ───────────────────────── NetsTuts-AP1(config-if)#mbssid ! ── Bridge group — links radio to BVI1 and FastEthernet0 ───────── NetsTuts-AP1(config-if)#bridge-group 1 NetsTuts-AP1(config-if)#bridge-group 1 subscriber-loop-control NetsTuts-AP1(config-if)#bridge-group 1 spanning-disabled NetsTuts-AP1(config-if)#bridge-group 1 block-unknown-source NetsTuts-AP1(config-if)#no bridge-group 1 source-learning NetsTuts-AP1(config-if)#no bridge-group 1 unicast-flooding NetsTuts-AP1(config-if)#exit
| Bridge-Group Sub-Command | Purpose |
|---|---|
subscriber-loop-control |
Prevents wireless clients from creating bridging loops by limiting how many MAC addresses are learned per client association |
spanning-disabled |
Disables STP on this bridge group — STP is not needed for the AP's internal bridge and its BPDUs would interfere with the wired network's STP |
block-unknown-source |
Drops frames with unknown source MAC addresses, preventing MAC flooding attacks from wireless clients |
no source-learning |
Disables MAC address learning on the bridge group — the AP does not build its own MAC table; clients are reached via the wired switch |
no unicast-flooding |
Prevents the AP from flooding unicast frames to all bridge-group members when the destination MAC is unknown — reduces unnecessary wireless airtime consumption |
channel command on Cisco autonomous APs accepts
the channel centre frequency in MHz, not the
channel number. Channel 1 = 2412, Channel 6 = 2437,
Channel 11 = 2462. You can also use channel least-congested
to let the AP scan and pick the least-used channel automatically
on boot — useful in environments where other APs are already
in use and interference varies. For full channel and power planning
guidance, see
Wireless RF Channel
and Power Planning.
10. Step 6 — Configure Dot11Radio1 (5 GHz)
The 5 GHz radio is configured identically in terms of SSIDs, cipher, and bridge group, but uses channel 36 (5180 MHz) from the U-NII-1 band — a non-DFS channel that does not require a radar scan delay before transmitting:
NetsTuts-AP1(config)#interface Dot11Radio1 NetsTuts-AP1(config-if)#no shutdown ! ── Channel 36 (5180 MHz) — U-NII-1, no DFS required ──────────── NetsTuts-AP1(config-if)#channel 5180 ! ── Transmit power: Level 2 ────────────────────────────────────── NetsTuts-AP1(config-if)#power local 2 ! ── Encryption: AES-CCMP ───────────────────────────────────────── NetsTuts-AP1(config-if)#encryption mode ciphers aes-ccm ! ── Both SSIDs ─────────────────────────────────────────────────── NetsTuts-AP1(config-if)#ssid NetsTuts-Corp NetsTuts-AP1(config-if)#ssid NetsTuts-Guest ! ── MBSSID ─────────────────────────────────────────────────────── NetsTuts-AP1(config-if)#mbssid ! ── Bridge group (same group as Radio0 and FastEthernet0) ──────── NetsTuts-AP1(config-if)#bridge-group 1 NetsTuts-AP1(config-if)#bridge-group 1 subscriber-loop-control NetsTuts-AP1(config-if)#bridge-group 1 spanning-disabled NetsTuts-AP1(config-if)#bridge-group 1 block-unknown-source NetsTuts-AP1(config-if)#no bridge-group 1 source-learning NetsTuts-AP1(config-if)#no bridge-group 1 unicast-flooding NetsTuts-AP1(config-if)#exit
11. Step 7 — Add FastEthernet0 to the Bridge Group and Save
FastEthernet0 must also be placed in bridge group 1 to complete the Layer 2 path from wireless clients to the wired LAN. Without this, the bridge is incomplete and clients cannot reach the switch:
NetsTuts-AP1(config)#interface FastEthernet0 NetsTuts-AP1(config-if)#no shutdown NetsTuts-AP1(config-if)#bridge-group 1 NetsTuts-AP1(config-if)#bridge-group 1 spanning-disabled NetsTuts-AP1(config-if)#no bridge-group 1 source-learning NetsTuts-AP1(config-if)#exit ! ── Confirm BVI1 is up ──────────────────────────────────────────── NetsTuts-AP1(config)#end NetsTuts-AP1#show ip interface brief Interface IP-Address OK? Method Status Protocol BVI1 192.168.10.20 YES manual up up Dot11Radio0 unassigned YES unset up up Dot11Radio1 unassigned YES unset up up FastEthernet0 unassigned YES unset up up NetsTuts-AP1#write memory Building configuration... [OK]
show interfaces
Gi1/0/2 status.
12. Verification
show dot11 associations
NetsTuts-AP1#show dot11 associations 802.11 Client Stations on Dot11Radio0: SSID [NetsTuts-Corp]: MAC Address IP Address Device Name Parent State a4.c3.f0.11.22.33 192.168.10.31 802.11n CORP-LAPTOP1 self Assoc SSID [NetsTuts-Guest]: MAC Address IP Address Device Name Parent State b8.27.eb.aa.bb.cc 192.168.10.55 802.11n - self Assoc 802.11 Client Stations on Dot11Radio1: SSID [NetsTuts-Corp]: MAC Address IP Address Device Name Parent State 00.1a.2b.3c.4d.5e 192.168.10.32 802.11ac CORP-LAPTOP2 self Assoc
show dot11 associations lists all currently
associated clients, grouped by radio and SSID. The
State: Assoc confirms the client has fully
associated. An IP address is shown if the AP has seen ARP
traffic from the client. If a client shows
Auth instead of Assoc, it
has completed 802.11 authentication but not yet association
— usually a PSK mismatch or encryption cipher
incompatibility.
show dot11 interface Dot11Radio0
NetsTuts-AP1#show dot11 interface Dot11Radio0 Dot11Radio0 Link is up Hardware is 802.11N 2.4GHz Radio, address is a0.e0.af.11.22.33 MTU is 1500, BW is 54000 Kbit Current Channel: 6, Frequency: 2437 MHz Current Tx Power Level: 2 = 17 dBm Antenna Gain: 2 dBi internal Radio Standard: 802.11n Encryption: AES-CCM Mode: Mixed (802.11b/g/n) Beacon Period: 100 TU DTIM Period: 2 SSIDs: NetsTuts-Corp, NetsTuts-Guest Associated clients: 2
mbssid guest-mode is present in both the global SSID
definition and under the radio interface.
show interfaces Dot11Radio0
NetsTuts-AP1#show interfaces Dot11Radio0
Dot11Radio0 is up, line protocol is up
Hardware is 802.11N Radio, address is a0:e0:af:11:22:33 (bia a0:e0:af:11:22:33)
MTU 1500 bytes, BW 54000 Kbit/sec, DLY 5000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.11, loopback not set
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:01, output 00:00:01, output hang never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
5 minute input rate 3000 bits/sec, 4 packets/sec
5 minute output rate 11000 bits/sec, 12 packets/sec
1284 packets input, 89640 bytes, 0 no buffer
3870 packets output, 1021476 bytes, 0 underruns
show ip interface BVI1
NetsTuts-AP1#show ip interface BVI1 BVI1 is up, line protocol is up Internet address is 192.168.10.20/24 Broadcast address is 255.255.255.255 Helper address is not set Outgoing access list is not set Inbound access list is not set Proxy ARP is enabled Local Proxy ARP is disabled Split horizon is enabled ICMP redirects are always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled Probe proxy name replies are disabled Policy routing is disabled Network address translation is disabled BGP Policy Mapping is disabled Input features: MCI Check IPv4 WCCP Redirect inbound is disabled IPv4 WCCP Redirect outbound is disabled IPv4 WCCP Redirect exclude is disabled
Verification Command Summary
| Command | What It Shows | Key Field to Check |
|---|---|---|
show dot11 associations |
All associated wireless clients per radio and SSID with MAC, IP, and state | State must be Assoc — not Auth (PSK/cipher issue) or Disassoc |
show dot11 interface Dot11Radio0 |
Radio operating parameters: channel, frequency, power level (dBm), encryption, SSIDs | Channel, Tx Power, Encryption (must be AES-CCM), both SSIDs listed |
show dot11 interface Dot11Radio1 |
Same as above for the 5 GHz radio | Channel 36 / 5180 MHz, AES-CCM, both SSIDs |
show interfaces Dot11Radio0 |
Interface counters, data rates, error counts | Line protocol up, no CRC errors, input/output rate confirms traffic is flowing |
show ip interface BVI1 |
BVI1 IP address and status | BVI1 is up, correct IP address assigned |
show ip interface brief |
All interfaces and their IPs and status in one table | BVI1 up/up with IP; Radio0, Radio1, Fa0 up/up with no IP (correct) |
show running-config |
Full configuration — verify dot11 ssid blocks, radio settings, bridge groups | Both SSID blocks present with correct PSK and key-management; bridge-group 1 on all three interfaces |
13. Troubleshooting Autonomous AP Issues
| Problem | Symptom | Cause | Fix |
|---|---|---|---|
| AP management IP unreachable after configuration | Cannot ping 192.168.10.20 from admin PC; SSH connection refused | BVI1 is down because FastEthernet0 is not in bridge group 1, or the switch port is not up, or PortFast was not applied and STP is still converging | On the AP: show ip interface brief — check BVI1 state. Verify bridge-group 1 is present under FastEthernet0 with show running-config | section FastEthernet0. On the switch: show interfaces Gi1/0/2 status — must show connected. Check VLAN 10 exists and is active on the switch. |
| SSIDs not visible in Wi-Fi scan | Clients cannot see NetsTuts-Corp or NetsTuts-Guest in their Wi-Fi scan | Radio interface is shut down (shutdown applied), mbssid guest-mode is missing from the SSID definition, or the SSID is not attached to the radio interface with the ssid command |
Check radio status: show interfaces Dot11Radio0 — must be up/up. Verify SSID attachment: show dot11 interface Dot11Radio0 — both SSIDs must appear in the SSIDs field. If missing, re-enter ssid NetsTuts-Corp under the radio interface. Verify mbssid is applied to the radio with show running-config | section Dot11Radio0. |
| Clients associate but get no IP address | Wireless client shows "connected, no internet" with APIPA address (169.254.x.x) | FastEthernet0 is not in bridge group 1, blocking the path from the wireless client to the DHCP server on the wired LAN. Alternatively, the DHCP server has no pool for 192.168.10.0/24, or the switch port is in the wrong VLAN | Verify bridge group on FastEthernet0: show running-config | section FastEthernet0 must include bridge-group 1. Add if missing. Check DHCP server has a pool for 192.168.10.0/24 with show ip dhcp pool on the DHCP server device. Confirm the AP switch port is VLAN 10: show interfaces Gi1/0/2 switchport on the switch. |
| WPA2 authentication fails — wrong password error on client | Client prompts for password, but correct PSK is rejected. Client shows authentication failure | PSK mismatch between AP and client, or the AP is running WPA1 (TKIP) instead of WPA2 because authentication key-management wpa version 2 was entered without the version 2 keyword, or the encryption cipher on the radio is set to TKIP instead of AES-CCMP. See Wi-Fi Security for WPA/WPA2 differences |
Verify SSID security: show running-config | section dot11 ssid — look for authentication key-management wpa version 2 (not just wpa). Verify cipher: show running-config | section Dot11Radio0 — must show encryption mode ciphers aes-ccm. Re-enter the PSK in the SSID block if the passphrase may have been typed incorrectly. |
| 5 GHz radio not transmitting — long delay on power-up | Dot11Radio1 comes up but is silent for 60+ seconds before beaconing. Clients cannot connect immediately after AP reboot | Channel 52, 56, 60, or 64 (U-NII-2A) or channels 100–144 (U-NII-2C) are configured. These DFS channels require a 60-second radar scan before the AP may transmit. The channel is listed as a DFS channel in your regulatory domain | Change the 5 GHz channel to a non-DFS channel: interface Dot11Radio1 → channel 5180 (channel 36) or channel 5825 (channel 165). U-NII-1 (channels 36–48, 5180–5240 MHz) and U-NII-3 (channels 149–165, 5745–5825 MHz) do not require DFS in most regulatory domains. Verify with show dot11 interface Dot11Radio1 — DFS status is shown if applicable. |
| Only one SSID visible when two are configured | Clients can see NetsTuts-Corp but NetsTuts-Guest does not appear in the scan, despite both being configured | mbssid is not applied to the radio interface (even if mbssid guest-mode is in the SSID definition, the radio interface must also have mbssid), or the second SSID is not attached to the radio with a ssid command |
Check radio config: show running-config | section interface Dot11Radio0 — must contain mbssid as a standalone command, and both ssid NetsTuts-Corp and ssid NetsTuts-Guest. If mbssid is missing from the radio interface block, enter interface Dot11Radio0 → mbssid. Both commands are required: one in the global SSID block (mbssid guest-mode) and one in the radio interface (mbssid). |
Key Points & Exam Tips
- An autonomous AP stores its full IOS configuration locally in flash and is managed directly via CLI or web GUI. It does not require a WLC — all SSID, radio, and security settings are configured on the AP itself. See Lightweight vs Autonomous AP for a comparison.
- The BVI (Bridge Virtual Interface) is the management IP interface on an autonomous AP — not FastEthernet0. Do not assign an IP address to FastEthernet0 or the radio interfaces. The BVI bridges all member interfaces (FastEthernet0, Dot11Radio0, Dot11Radio1) at Layer 2.
- SSIDs on autonomous APs are defined globally under
dot11 ssid [name]configuration mode. To broadcast an SSID from a radio interface, it must be explicitly attached to the radio with thessid [name]command under the radio interface. Defining the SSID globally is not enough. - WPA2 requires two commands in the SSID block:
authentication open(sets the 802.11 authentication frame type — not WEP) andauthentication key-management wpa version 2. Missingversion 2defaults to WPA1/TKIP. - For multiple SSIDs on one radio, both
mbssid guest-modein the SSID global configuration andmbssidunder the radio interface are required. One without the other results in only the primary SSID being broadcast. - The 2.4 GHz band has only three non-overlapping channels: 1, 6, and 11 (centre frequencies 2412, 2437, 2462 MHz). In a multi-AP deployment, adjacent APs must use different non-overlapping channels. On Cisco autonomous APs, the
channelcommand takes the frequency in MHz, not the channel number. See Wi-Fi Frequency and Channels. - Transmit power on Cisco autonomous APs uses a level index (1–8). Level 1 is maximum power; each level halves the power (3 dB reduction). Level 2 is half power (typically ~17 dBm / 50 mW for a 2.4 GHz radio with 20 dBm maximum). See Antenna and RF Basics.
- Avoid DFS channels (52–64, 100–144 in 5 GHz) in environments requiring fast AP restart times — DFS channels require a 60-second radar scan before the AP can begin transmitting. Use U-NII-1 (channels 36–48) or U-NII-3 (channels 149–165) for non-DFS operation.
- All three interfaces (FastEthernet0, Dot11Radio0, Dot11Radio1) must be assigned to the same bridge group 1 to complete the Layer 2 path between wireless clients and the wired LAN through BVI1.
- On the CCNA exam: know the BVI concept, the two-step SSID configuration (global definition + radio attachment), WPA2 command syntax (
authentication open+authentication key-management wpa version 2+wpa-psk ascii), non-overlapping 2.4 GHz channels, and the difference between autonomous and lightweight AP data/control plane models.