Copyright © 2004 Cisco Systems, Inc. All rights reserved.
Page 17 of 53
3.2.1 Voice over IP
Using the QoS feature, voice traffic can be prioritized by defining a policy and assigning that policy
to the VLAN carrying the voice traffic.
At this time, the 1400 series Bridge supports voice only in P2P links. Voice in a P2MP
configuration is limited and has not been fully tested yet, however; it will support some number of
simultaneous voice calls as it has the same QoS mechanisms as point to point networks. Keep in
mind, since there is no over the air QoS coordination between end points, it will not be as efficient
as point to point network. Voice in P2MP networks will be possible when PCF mode is
implemented down the line.
The maximum number of voice lines for P2P links in the table below. The number of voice calls
shown in the table has been taken along with the data traffic running in the network. Number of
voice lines has been calculated by setting a maximum jitter bound of 25 ms. This cannot be
guaranteed for 6 and 9 mbps rates. For P2P links supporting voice those rates needs to be
disabled or the voice quality will be poorer depending on the rest of the network architecture.
Rate (Mbps)
# Calls G.711
# Calls G.729
54
15
44
48
15
44
36
15
44
24
15
44
18
15
44
12
15
44
9
NO SUPPORT
NO SUPPORT
6
NO SUPPORT
NO SUPPORT
Table 4.
Maximum number of calls for P2P for G711 and G729 codec (jitter<25 ms)
3.3 Security
Security is a major part of any enterprise deployment and as such Cisco has spent quite a bit of
time on ensuring the security of not only the wireless links as a whole but also the Bridge itself.
Multiple types of security levels are available on 1400 Series Bridge.
Configuring your own SSID on the 1400 Bridges provides a rudimentary level of security. 1400
Bridge also provides different type of encryptions on the data going across the link, like Static
Wired Equivalent Privacy (WEP), Dynamic WEP using LEAP, TKIP (Temporal Key Integrity
Protocol) and MIC (Message Integrity Check). 1400 wireless bridge supports Cisco Wireless
Enhanced Authentication Protocol (LEAP). LEAP is a Cisco proprietary implementation
conforming to the IEEE 802.1x Draft Security Standard for port-based network access control.
LEAP authenticates the user and assigns a new WEP key every time a client associates or