Appendix E Wireless LANs
several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows:
Table 108 IEEE 802.11g
DATA RATE | MODULATION | |
(MBPS) | ||
| ||
1 | DBPSK (Differential Binary Phase Shift Keyed) | |
|
| |
2 | DQPSK (Differential Quadrature Phase Shift Keying) | |
|
| |
5.5 / 11 | CCK (Complementary Code Keying) | |
|
| |
6/9/12/18/24/36/ | OFDM (Orthogonal Frequency Division Multiplexing) | |
48/54 |
| |
|
|
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network.
Wireless security methods available on the
The following figure shows the relative effectiveness of these wireless security methods available on your
Table 109 Wireless Security Levels
SECURITY | SECURITY TYPE | |
LEVEL | ||
| ||
Least | Unique SSID (Default) | |
Secure |
| |
Unique SSID with Hide SSID Enabled | ||
| ||
|
| |
| MAC Address Filtering | |
|
| |
| WEP Encryption | |
|
| |
| IEEE802.1x EAP with RADIUS Server | |
| Authentication | |
|
| |
| ||
Most Secure |
| |
WPA2 | ||
|
|
Note: You must enable the same wireless security settings on the
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional
326 |
| |
| ||
|
|
|