D-Link Unified Access System
Software User Manual
02/15/2011
Page 92
Document 34CS3000-SWUM104-D10
W
IRELESS
N
ETWORK
S
UMMARY
To navigate to the
Wireless Network Summary
page, click
WLAN > Administration > Advanced Configuration >
Networks
.
Table 15: Wireless Network Summary
Field
Description
SSID
Wireless clients identify a wireless network by the SSID, which is
an alphanumeric key that uniquely identifies a wireless local area
network. The SSID can be up to thirty-two characters in length,
and there are no restrictions on the characters that may be used
in an SSID.
VLAN
A virtual LAN (VLAN) is a software-based, logical grouping of
devices on a network that allow them to act as if they are
connected to a single physical network, even though they may not
be. The nodes in a VLAN share resources and bandwidth, and are
isolated on that network.
The D-Link Unified Access System supports the configuration of a
wireless VLAN. You can configure each VAP to be on a unique
VLAN or on the same VLAN as other VAPs.
When a wireless client connects to the AP by using this network
(SSID), the AP tags the client’s traffic with the VLAN ID you
configure in this field. By default, all networks use VLAN 1, which
is also untagged by default.
Note:
The VLAN ID you configure in this field can be overwritten
by the VLAN ID configured for the AP in the RADIUS server. In
other words, if your network uses a RADIUS server to assign
wireless clients to VLANs, the wireless client uses the VLAN ID
from the RADIUS server and ignores the VLAN ID configured on
the VAP.
Hide SSID
You can hide the SSID broadcast to discourage stations from
automatically discovering your access point. When the broadcast
SSID of the AP is hidden, the network name is not displayed in the
list of available networks on a client station. Instead, the client
must have the exact network name configured in the supplicant
before it is able to connect.
Disabling the broadcast SSID is sufficient to prevent clients from
accidentally connecting to your network, but it will not prevent
even the simplest of attempts by a hacker to connect, or monitor
unencrypted traffic.
This offers a very minimal level of protection on an otherwise
exposed network (such as a guest network) where the priority is
making it easy for clients to get a connection and where no
sensitive information is available.