Fig. 41. Sample wireless bridge network topology.
WARNING:
Do not let your network topology consist of wireless bridges, Ethernet switches,
Ethernet links, and WDS links that form a loop. If there are any loops that exist, packets will
circle around the loops and network performance will be seriously degraded.
Fig. 42. Network topology containing a loop.
3.5.2. Security
IEEE 802.11b/g security settings include SSID broadcasts, Security mode, IEEE 802.11
Authentication algorithm, WEP keys, MAC-Address-Based Access Control.
31