Quality Of Service (Qos) Support; Industry Leading Data Security - Extreme Networks Altitude 4700 Series Product Reference Manual

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

Quality of Service (QoS) Support

The QoS implementation provides applications running on different wireless devices a variety of
priority levels to transmit data to and from the Access Point. Equal data transmission priority is fine for
data traffic from applications such as Web browsers, file transfers or email, but is inadequate for
multimedia applications.
Voice over Internet Protocol (VoIP), video streaming and interactive gaming are highly sensitive to latency
increases and throughput reductions. These forms of higher priority data traffic can significantly benefit
from the QoS implementation.The WiFi Multimedia QOS Extensions (WMM) implementation used by the
shortens the time between transmitting higher priority data traffic and is thus desirable for multimedia
applications. In addition, U-APSD (WMM Power Save) is also supported.
WMM defines four access categories—voice, video, best effort and background—to prioritize traffic for
enhanced multimedia support.
For detailed information on configuring QoS support, see
Policy" on page
156.

Industry Leading Data Security

The Access Point supports numerous encryption and authentication techniques to protect the data
transmitting on the WLAN.
The following authentication techniques are supported:
Kerberos Authentication on page 27
EAP Authentication on page 28
The following encryption techniques are supported:
WEP Encryption on page 28
KeyGuard Encryption on page 29
Wi-Fi Protected Access (WPA) Using TKIP Encryption on page 29
WPA2-CCMP (802.11i) Encryption on page 29
In addition, the Access Point supports the following additional security features:
Firewall Security on page 30
VPN Tunnels on page 30
Content Filtering on page 30
For an overview on the encryption and authentication schemes available, refer to
Point Security" on page
197.
Kerberos Authentication
Authentication is a means of verifying information transmitted from a secure source. If information is
authentic, you know who created it and you know it has not been altered in any way since it was
originated. Authentication entails a network administrator employing a software "supplicant" on their
computer or wireless device.
Authentication is critical for the security of any wireless LAN device. Traditional authentication
methods are not suitable for use in wireless networks where an unauthorized user can monitor network
Altitude 4700 Series Access Point Product Reference Guide
"Setting the WLAN Quality of Service (QoS)
"Configuring Access
27

Advertisement

Table of Contents
loading

Table of Contents