31
Fig. 41. Sample wireless bridge network topology.
WARNING:
Do not let your network topology consist of wireless bridges, Ethernet switches,
Ethernet links, and WDS links that form a loop. If there are any loops that exist, packets will
circle around the loops and network performance will be seriously degraded.
Fig. 42. Network topology containing a loop.
3.5.2. Security
IEEE 802.11b/g security settings include
SSID broadcasts
,
Security mode
,
IEEE 802.11
Authentication algorithm
,
WEP keys
,
MAC-Address-Based Access Control
.
Содержание 2585W-G FICHE
Страница 1: ......