Configuring
Cisco 1702i Autonomous access point for use with Chromecast
Assuming you’d like to
connect a client computer to your chromecast via the same WLAN on your Cisco
AP, all you need to do is follow the below steps.
Assumptions:
- The Cisco AP is configured with
only a single SSID, and that SSID happens to be associated with vlan 2.
- You are broadcasting the WLAN
on both radios
- All the required configuration
to support clients (SSID, Auth, etc) is already setup
Instructions:
- Login to your AP using the
command line, issues a show run
- The output of your show run command should have some lines
similar to what’s below:
!
interface Dot11Radio0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface Dot11Radio1.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface Dot11Radio0.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
interface Dot11Radio1.2
encapsulation dot1Q 2
no ip route-cache
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
!
So if our SSID is affiliated
with vlan 2, we’ll need to issue a command to each of our sub interfaces using
that vlan: Dot11Radio0.2 and Dot11Radio1.2
Enter the following commands:
- # config t
- (config)# interface Dot11Radio0.2
- (config-if)# no bridge-group 2 port-protected
- (config-if)# exit
- (config)# interface Dot11Radio1.2
- (config-if)# no bridge-group 2 port-protected
- (config-if)# exit
Now we’ll also need to
globally stop IGMP snooping, we’ll enter this additional command from global
config mode:
- # config t
- (config)# no ip igmp snooping
- (config-if)# exit