Fig. 44. Behavior of the “This AP Only” wireless client isolation option.
Fig. 45. Behavior of the “All APs on This Subnet” wireless client isolation option.
As illustrated in Fig 44 when AP 1 and AP 2 are using the “This AP Only” option, wireless traffic between STA 1 and STA 2 is blocked by AP 1, while wireless traffic between STA 2 and STA 3, which are associated with different APs, is still allowed. If the “All APs in This Subnet” option is used as shown in Fig. 45, AP 1 and AP 2 communicate s with each other via an
There are up to 2 security modes:
•Open System. No authentication, no data encryption.
•Static WEP. WEP (Wired Equivalent Privacy) keys must be manually configured.
According to the IEEE 802.11 standard,WEP can be used for authentication and data encryption. Normally, Shared Key authentication is used if WEP data encryption is enabled. In rare cases, Open System authentication may be used when WEP data encryption is enabled.The Authentication
37