Quality of Service (QoS) Support
The QoS implementation provides applications running on different wireless devices a variety of
priority levels to transmit data to and from the Access Point. Equal data transmission priority is fine for
data traffic from applications such as Web browsers, file transfers or email, but is inadequate for
multimedia applications.
Voice over Internet Protocol (VoIP), video streaming and interactive gaming are highly sensitive to latency
increases and throughput reductions. These forms of higher priority data traffic can significantly benefit
from the QoS implementation.The WiFi Multimedia QOS Extensions (WMM) implementation used by the
shortens the time between transmitting higher priority data traffic and is thus desirable for multimedia
applications. In addition, U-APSD (WMM Power Save) is also supported.
WMM defines four access categories—voice, video, best effort and background—to prioritize traffic for
enhanced multimedia support.
For detailed information on configuring QoS support, see
Policy" on page
156.
Industry Leading Data Security
The Access Point supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported:
Kerberos Authentication on page 27
●
EAP Authentication on page 28
●
The following encryption techniques are supported:
WEP Encryption on page 28
●
KeyGuard Encryption on page 29
●
Wi-Fi Protected Access (WPA) Using TKIP Encryption on page 29
●
WPA2-CCMP (802.11i) Encryption on page 29
●
In addition, the Access Point supports the following additional security features:
Firewall Security on page 30
●
VPN Tunnels on page 30
●
Content Filtering on page 30
●
For an overview on the encryption and authentication schemes available, refer to
Point Security" on page
197.
Kerberos Authentication
Authentication is a means of verifying information transmitted from a secure source. If information is
authentic, you know who created it and you know it has not been altered in any way since it was
originated. Authentication entails a network administrator employing a software "supplicant" on their
computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor network
Altitude 4700 Series Access Point Product Reference Guide
"Setting the WLAN Quality of Service (QoS)
"Configuring Access
27