
Elpro Technologies 450U-E Wireless Ethernet Modem & Device Server User Manual
36
www.cooperbussmann.com/wirelessresources
Rev Version 1.0.12-Beta7
, likewise Site B also has a Virtual Client
configured that connects with the Access Point at Site C who also has a Virtual Client that connects to the Access Point
at Site D.
In this example each Virtual connection is using the same Encryption method (WPA2-PSK (AES) with a key of
passp
or even disabled (no encryption)
however it is recommended the encryption method be equal to or greater than the main system so as to maintain system
security. Also since it is a bridged network the Spanning Tree Protocol is disabled on the network configuration page as
there is no possibility of network loops.
Example 2 - Roaming with WDS Access Points
Another common use for WDS is extending the range across a large wireless network but allowing roaming connections
between access points or being able to switch to the next Access Point when out of range of the previous Access Point.
The diagram in Figure 40 above shows a bridging network with a number of Access Points all with the same SSID,
network structure, etc. (so as the Roaming Client/Stations can freely roam between Access Points)
Each Access Point then needs a separate connection to the next Access Point, which is done using the WDS Virtual
Access Points and Client/Stations
The configuration for Site B is shown below in Figure 41. The WDS is configured with a Virtual Access Point for the virtual
clients configured at Sites A & C. The Encryption Method and key are configured the same as the main network for
simplicity.
Figure 40 - WDS Roaming
Figure 39 - Site A WDS Configuration
Figure 41 - Site B WDS Configuration 2