
5 Configuring Access Point Settings
Both of the APs in Figure 41 use the same default profile. The default profile has three virtual access points (VAPs) enabled, and each VAP uses a different network (SSID). When users search for available wireless networks, all three SSIDs appear in the list of networks. The laptop clients connect to the Company WLAN or Guest Network, and the VoIP phones connect to the VoIP Network.
The L3 Tunnel feature is enabled on the VoIP network, but it is disabled on the Guest and Company WLAN networks since those networks are primarily for data traffic. The VoIP network is for voice traffic. L3 Roaming uses IP tunneling so clients appear to be on the same subnet even though the APs are on different subnets.
In the sample network that Figure 41 shows, the laptop users are connected to different WLAN networks on two different APs. The Internet phone users are connected to the same WLAN network on two different APs. On the VoIP Network, the phone users can seemlessly roam between AP1 and AP2 without service interruption or the need to
The WCS uses a VLAN routing interface as a separate logical network configured for the L3 tunnel network. This network is the L3 tunneling subnet and has a network address of 192.168.100.0.
For information about how to configure a network to use L3 tunneling, including CLI commands and Web configuration procedures, see Appendix C, “L3 Roaming Example” on page 187.
Configuring AP Security
The Default AP profile does not use any security mechanism by default. In order to protect your network, we strongly recommend that you select a security mechanism so that unauthorized wireless clients cannot gain access to your network.
From the Wireless Network Configuration page, you can select None, WEP or WPA/WPA2 as the WLAN security mechanisms, as Figure 42 shows. The default is None.
Figure 42. AP Network Security Options
The following sections describe the security mechanicians.
Using No Security
If you select None as your security mode, no further options are configurable on the AP. This mode means that any data transferred between the
This security mode can be useful during initial network configuration or for problem solving, but it is not recommended for regular use on the internal network because it is not secure.
Configuring SSID Settings 93