LevelOne WAP-6101 User Manual page 30

Managed ceiling wireless access point; 300mbps 802.11n, gigabit ethernet, poe 802.3af
Hide thumbs Also See for WAP-6101:
Table of Contents

Advertisement

7.
VLAN ID: This device supports mapping of a SSID to a certain VLAN ID to
separate workgroups across wireless and wired domains. By default, it is not
enables. If you enabled this function, you have to specify a VLAN ID for the
wireless network.
8.
Max Supported Stations: You can specify the number of maximum stations that
can associate to the SSID simultaneously.
9.
Channel: The radio channel number. The permissible channels depend on the
Regulatory Domain. The factory default setting is auto channel selection. It's
recommended to choose a channel that is not used in your environment to
reduce radio interference
10. Wireless Mode: The RF1 module supports 802.11b/g/n modes. You can also
choose "N only", "G/N mixed" or "B/G/N mixed". The factory default setting is
"B/G/N mixed".
11. Bandwidth: The default setting for Bandwidth is "Auto". You can change it to
"20MHz" with care if some clients are suffering from the connectivity problem in
higher bandwidth setting.
12. Authentication & Encryption: You may select one of the following
authentications to secure your wireless network: Open (include 802.1x), Shared,
Auto, WPA-PSK, WPA, WPA2-PSK, WPA2, WPA-PSK/WPA2-PSK, or WPA
/WPA2.
 Open
Open system authentication simply consists of two communications. The first
is an authentication request by the client that contains the station ID (typically
the MAC address). This is followed by an authentication response from the AP
containing a success or failure message. An example of when a failure may
occur is if the client's MAC address is explicitly excluded in the AP's
configuration.
In this mode you can also enable the 802.1x feature if you have another
RADIUS server for user authentication. You need to input IP address, port,
shared key of RADIUS server here.
In this mode, you can only choose "None" or "WEP" in the encryption field.
 Shared
Shared key authentication relies on the fact that both stations taking part in the

Advertisement

Table of Contents
loading

Table of Contents