{"id":2509,"date":"2017-06-19T03:31:50","date_gmt":"2017-06-19T03:31:50","guid":{"rendered":"http:\/\/pariswells.com\/blog\/?p=2509"},"modified":"2017-06-19T04:03:42","modified_gmt":"2017-06-19T04:03:42","slug":"error-encryption-mode-cipher-is-not-configured-cisco-1140","status":"publish","type":"post","link":"https:\/\/pariswells.com\/blog\/networking\/error-encryption-mode-cipher-is-not-configured-cisco-1140","title":{"rendered":"Error: Encryption mode cipher is not configured Cisco 1140"},"content":{"rendered":"<p>When going through the commands to enable WPA on cisco Wireless Account point<\/p><p><br \/><strong>ap(config)#interface Dot11Radio0<\/strong><br \/><strong>ap(config-if)# encryption mode ciphers aes-ccm<\/strong><br \/><br \/><\/p><p>Then<\/p><p><br \/><strong>ap(config-ssid)#authentication open<\/strong><br \/><strong>ap(config-ssid)#authentication key-management wpa version 2<\/strong><br \/><br \/>I was shown <strong>Error: Encryption mode <\/strong>cipher<strong> is not configured.<\/strong><\/p><div><p>Turns out this setting needs to be applied to each VLAN presented to the SSID<\/p><p><strong>ap(config)#interface Dot11Radio0<\/strong><\/p><p><strong>ap(config-if)#encryption <\/strong>vlan<strong> 13 mode ciphers <\/strong>aes<strong>-ccm <\/strong>tkip<\/p><p>I could then run<\/p><p><strong>ap(config-ssid)#authentication open<\/strong><\/p><p><strong>ap(config-ssid)#authentication key-management wpa version 2<\/strong><\/p><p><strong>ap(config-ssid)#guest-mode<\/strong><\/p><p><strong>ap(config-ssid)#wpa-psk ascii WirelessPassword<\/strong><\/p><\/div><div class=\"line number4 index3 alt1\"><code class=\"plain plain\"><\/code><\/div>","protected":false},"excerpt":{"rendered":"<p>When going through the commands to enable WPA on cisco Wireless Account pointap(config)#interface Dot11Radio0ap(config-if)# encryption mode ciphers aes-ccmThenap(config-ssid)#authentication openap(config-ssid)#authentication key-management wpa version 2I was shown Error: Encryption [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1527],"tags":[1887,1114,1892,1894,1889,1893,1890,1891,1888],"class_list":["post-2509","post","type-post","status-publish","format-standard","hentry","category-networking","tag-1887","tag-cisco","tag-command-line","tag-enable-wpa","tag-security","tag-ssid","tag-wpa","tag-wpa-2","tag-wpa2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/comments?post=2509"}],"version-history":[{"count":8,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions"}],"predecessor-version":[{"id":2518,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/posts\/2509\/revisions\/2518"}],"wp:attachment":[{"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/media?parent=2509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/categories?post=2509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pariswells.com\/blog\/wp-json\/wp\/v2\/tags?post=2509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}