Access Category | Displays the Access Category for the intended AP traffic. The Access Categories are the | |
| different | |
| The Access Category types are: | |
| • Automatic/WMM– Optimized for WMM | |
| • | Voice– Optimized for voice traffic |
| • | Video– Optimized for video traffic |
| • | Normal– Optimized for normal traffic |
| • | Low– Optimized for background traffic |
MCast Addr 1 | The address provided takes packets (where the first 4 bytes match the first 4 bytes of the | |
| mask) and sends them immediately over the air instead of waiting for the DTIM period. Any | |
| multicast/broadcast that does not match this mask will go out only on DTIM Intervals. | |
MCast Addr 2 | The second multicast address also takes packets (where the first 4 bytes match the first 4 | |
| bytes of the mask) and sends them immediately over the air instead of waiting for the DTIM |
period. Any multicast/broadcast that does not match this mask will go out only on DTIM Intervals.
NOTE: If the WLAN is supporting multimedia applications (video or voice), ensure a valid multicast address is provided. If using a 802.11bg radio, ensure “24” is also selected as an additional Basic data rate. In addition, ensure the
9.Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something goes wrong in the transaction between the applet and the switch.
10.Click OK to use the changes to the running configuration and close the dialog.
11.Click Cancel to close the dialog without committing updates to the running configuration.
4.5.1.2Configuring Authentication Types
Refer to the following to configure the WLAN authentication options available on the WS5100. Refer to the following
•Configuring 802.1x EAP
•Configuring Kerboros
•Configuring Hotspots
•Configuring an Internal Hotspot
•Configuring External Hotspot
•Configuring Advanced Hotspot
•Configuring Dynamic MAC ACL
Configuring 802.1x EAP
The IEEE 802.1x standard ties the 802.1x EAP authentication protocol to both wired and wireless LAN applications.
The EAP process begins when an unauthenticated supplicant (MU) tries to connect with an authenticator (in this case, the authentication server). The switch passes EAP packets from the client to an authentication