![Extreme Networks Altitude 4700 Series Скачать руководство пользователя страница 27](http://html1.mh-extra.com/html/extreme-networks/altitude-4700-series/html/extreme-networks/altitude-4700-series/altitude-4700-series_product-reference-manual_2454778027.webp)
Altitude 4700 Series Access Point Product Reference Guide
27
Quality of Service (QoS) Support
The QoS implementation provides applications running on different wireless devices a variety of
priority levels to transmit data to and from the Access Point. Equal data transmission priority is fine for
data traffic from applications such as Web browsers, file transfers or email, but is inadequate for
multimedia applications.
Voice over Internet Protocol
(VoIP), video streaming and interactive gaming are highly sensitive to latency
increases and throughput reductions. These forms of higher priority data traffic can significantly benefit
from the QoS implementation.The
WiFi Multimedia QOS Extensions (WMM)
implementation used by the
shortens the time between transmitting higher priority data traffic and is thus desirable for multimedia
applications. In addition, U-APSD (WMM Power Save) is also supported.
WMM defines four access categories—
voice,
video
,
best effort
and
background
—to prioritize traffic for
enhanced multimedia support.
For detailed information on configuring QoS support, see
“Setting the WLAN Quality of Service (QoS)
Policy” on page 156
.
Industry Leading Data Security
The Access Point supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported:
●
Kerberos Authentication on page 27
●
EAP Authentication on page 28
The following encryption techniques are supported:
●
WEP Encryption on page 28
●
KeyGuard Encryption on page 29
●
Wi-Fi Protected Access (WPA) Using TKIP Encryption on page 29
●
WPA2-CCMP (802.11i) Encryption on page 29
In addition, the Access Point supports the following additional security features:
●
Firewall Security on page 30
●
VPN Tunnels on page 30
●
Content Filtering on page 30
For an overview on the encryption and authentication schemes available, refer to
“Configuring Access
Point Security” on page 197
.
Kerberos Authentication
Authentication is a means of verifying information transmitted from a secure source. If information is
authentic
, you know who created it and you know it has not been altered in any way since it was
originated. Authentication entails a network administrator employing a software “supplicant” on their
computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor network
Содержание Altitude 4700 Series
Страница 14: ...Altitude 4700 Series Access Point Product Reference Guide 14...
Страница 62: ...Hardware Installation Altitude 4700 Series Access Point Product Reference Guide 62...
Страница 76: ...Getting Started Altitude 4700 Series Access Point Product Reference Guide 76...
Страница 122: ...System Configuration Altitude 4700 Series Access Point Product Reference Guide 122...
Страница 592: ...Configuring Mesh Networking Altitude 4700 Series Access Point Product Reference Guide 592 3 Define a mesh supported WLAN...
Страница 604: ...Configuring Mesh Networking Altitude 4700 Series Access Point Product Reference Guide 604...
Страница 624: ...Adaptive AP Altitude 4700 Series Access Point Product Reference Guide 624...
Страница 630: ...Altitude 4700 Series Access Point Product Reference Guide 630...
Страница 646: ...Altitude 4700 Series Access Point Product Reference Guide 646...
Страница 648: ...Altitude 4700 Series Access Point Product Reference Guide 648...