4-6
Cisco 880 Series Integrated Services Router Software Configuration Guide
OL-22206-01
Chapter 4 Basic Wireless Device Configuration
Configuring Wireless Settings
For details about setting up the wireless device in this role, see Using the Access Point as a Local
Authenticator at:
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/SecurityLocalAuthent.html

Configuring WEP a nd Ciph er Suit es

W ired Equivalent Privacy (WEP) encryption scrambles the data transmitt ed between wirel ess devices to
keep the communication private. Wireless devices and their wireless client devices use the same WEP
key to encrypt and decrypt data. WEP keys encrypt both unicast and multicast messages. Unicast
messages are addressed to one device on the network. Multicast messages are addressed to multiple
devices on t he network.
Cipher suites are sets of encryption and integrity algorithms designed to protect radio communication
on your wireless LAN. You must use a cipher suite to enable Wi-Fi Protected Access (W PA) or Cisco
Centralized Key Manageme nt (CCKM ).
Cipher suites that co ntain Temporal Key Integrity Pr otocol (TKIP) provi de the greatest security for your
wireless LAN. Cipher suites that contain only WEP are the least secure.
For encryption procedures, see Configuring WEP and Cipher Suites at:
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/SecurityCipherSuitesWEP.ht
ml

Configuring Wireless VLANs

If you use VLANs on your wireless LAN and assign SSIDs to VLANs, you can create multiple SSIDs
by using any of the four secu rity set tin gs defined i n the “Security Types” section on page 4-7. A VLAN
can be thought of as a broadcast domain that exists within a defined set of switches. A VLAN consists
of a number of end systems, either hosts or network equipment (such as bridges and routers), that are
connected by a single brid ging dom ai n. The bridg ing d omain is supported on various pieces of network
equipment such as LAN switches that operate bridging prot ocols between them wit h a separate grou p of
protocols for each VLA N.
For more information about wireless VLAN architecture, see Configuring Wireless VLANs at:
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/wireless_vlans.html
Note If you do not use VLANs on your wireless LAN, the security options that you can assign to
SSIDs are limited because the encryption settings and authentication types are linked on the
Express Security page.
Assigning SSIDs
You can configure up to 16 SSIDs on a wireless device in the role of an access point, and you can
configure a unique set of parameters for each SSID. For example, you might use one SSID to allow
guests limited access to the network and another SSID to allow authorized users access to secure data.
For more about creating multiple SSIDs, see Service Set Identifiers document at:
http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/ServiceSetID.html.