Appendix B Wireless LANs
several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows:
Table 98 IEEE 802.11g
DATA RATE | MODULATION | |
(MBPS) | ||
| ||
1 | DBPSK (Differential Binary Phase Shift Keyed) | |
|
| |
2 | DQPSK (Differential Quadrature Phase Shift Keying) | |
|
| |
5.5 / 11 | CCK (Complementary Code Keying) | |
|
| |
6/9/12/18/24/36/ | OFDM (Orthogonal Frequency Division Multiplexing) | |
48/54 |
| |
|
|
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network.
Wireless security methods available on the NWA are data encryption, wireless client authentication, restricting access by device MAC address and hiding the NWA identity.
The following figure shows the relative effectiveness of these wireless security methods available on your NWA.
Table 99 Wireless Security Levels
SECURITY | SECURITY TYPE | |
LEVEL | ||
| ||
Least | Unique SSID (Default) | |
Secure |
| |
Unique SSID with Hide SSID Enabled | ||
| ||
|
| |
| MAC Address Filtering | |
|
| |
| WEP Encryption | |
|
| |
| IEEE802.1x EAP with RADIUS Server | |
| Authentication | |
|
| |
| ||
|
| |
| WPA2 | |
Most Secure |
| |
|
|
Note: You must enable the same wireless security settings on the NWA and on all wireless clients that you want to associate with it.
324 |
| |
| ||
|
|
|