11
In an ESS environment, users are able to move from one access point to another without losing
the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the
SMCWPCI-N automatically switches to the channel used in BSS (2).
Wireless LAN Security
Because wireless networks are not as secure as wired networks, it’s vital that security settings
are clearly understood and applied.
The list below shows the possible wireless security levels on your SMCWPCI-N starting with the
most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes
dynamic WEP key exchange. EAP requires interaction with a RADIUS (Remote Authentication
Dial-In User Service) server either on the WAN or the LAN to provide authentication service for
wireless stations.
1. Wi-Fi Protected Access (WPA)
2. IEEE802.1X EAP with RADIUS Server authentication
3. WEP
Encryption
4. Unique
ESSID
Roaming in an ESS network diagram
D
O
NOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A
NETWORK WITHOUT AUTHORIZATION AND WITHOUT CLEARLY UNDERSTANDING
THE SETTINGS YOU ARE APPLING.
W
ITH POOR SECURITY SETTINGS, SENSITIVE
DATA YOU SEND CAN BE SEEN BY OTHERS.