
257
A client sends a probe request (with a specified SSID): When the wireless client is configured to access
a specific wireless network or has already successfully accessed a wireless network, the client
periodically sends a probe request carrying the specified SSID of the configured or connected wireless
network. When an AP that can provide the wireless service with the specified SSID receives the probe
request, it sends a probe response. This active scanning mode enables a client to access a specified
wireless network. The active scanning process is as shown in
.
Figure 256
Active scanning (the probe request carries the specified SSID AP 1)
2.
Passive scanning
Passive scanning is used by clients to discover surrounding wireless networks through listening to the
beacon frames periodically sent by an AP. All APs providing wireless services periodically send beacon
frames, so that wireless clients can periodically listen to beacon frames on the supported channels to get
information about surrounding wireless networks. Passive scanning is used by a client when it wants to
save battery power. Typically, VoIP clients adopt the passive scanning mode. The passive scanning
process is as shown in
Figure 257
Passive scanning
Authentication
To secure wireless links, the wireless clients must be authenticated before accessing the AP, and only
wireless clients passing the authentication can be associated with the AP. 802.11 links define two
authentication mechanisms: open system authentication and shared key authentication.
•
Open system authentication
Open system authentication is the default authentication algorithm. This is the simplest of the available
authentication algorithms. Essentially it is a null authentication algorithm. Any client that requests
authentication with this algorithm can become authenticated. Open system authentication is not required
to be successful as an AP may decline to authenticate the client. Open system authentication involves a
two-step authentication process. In the first step, the wireless client sends a request for authentication. In
the second step, the AP returns the result to the client.
Содержание WA2612-AGN
Страница 106: ...93 Figure 90 Create a static MAC address entry ...
Страница 126: ...113 Figure 116 Information about an IGMP snooping multicast entry ...
Страница 145: ...132 Enter 10 1 1 2 for Gateway Address c Click Apply Figure 133 Configure a dynamic address pool for the DHCP server ...
Страница 187: ...174 Figure 174 Firefox web browser setting ...
Страница 219: ...206 Figure 202 Common configuration area 6 Configure the advanced parameters ...
Страница 243: ...230 Number of users Real time accounting interval in minutes 500 to 999 12 1000 15 ...
Страница 278: ...265 Figure 266 Network diagram LAN Segment ...
Страница 339: ...326 Figure 348 Configure the wireless card I ...
Страница 340: ...327 Figure 349 Configure the wireless card II ...
Страница 346: ...333 Figure 357 Configure the wireless card II ...