This article contains the frequently asked questions in setting up, configuring, and troubleshooting the Cisco Wireless Access Points (WAPs) and their answers.
A Virtual Local Area Network (VLAN) is a switched network that is logically sorted by function, area, or application, regardless of the physical locations of the users.
The IEEE 802.1Q specification establishes a standard method for tagging Ethernet frames with VLAN membership information, and defines the operation of VLAN bridges that permit the definition, operation, and administration of VLAN topologies within a bridged LAN infrastructure.
The Service Set Identifier (SSID) is a unique identifier or a network name that wireless clients can connect to or share among all devices in a wireless network.
It is possible to set up several SSIDs or Virtual Access Points (VAPs) on your access point and assign different configuration settings to each of them. All the SSIDs may be active at the same time and client devices can associate to the access point using any of them.
SSID Broadcast is the manner where in a wireless network is advertising or making itself visible to any wireless device that searches the area for wireless networks that it can connect to. The broadcast of the SSID is enabled by default but can be disabled to prevent any wireless device from seeing your wireless network.
The wireless scheduler feature helps to schedule a time interval for a VAP or radio to be operational, which helps to save power and increase security.
Bandwidth utilization allows you to place a threshold on the average successful data transfer through a communication path.
Spanning Tree Protocol (STP) is a network protocol used to ensure a loop-free topology for a LAN by removing loops through an algorithm that guarantees that there is only one active path between two network devices. STP ensures that traffic takes the shortest path possible within the network and can also automatically re-enable redundant paths as back up paths if an active path fails.
Rapid Spanning Tree Protocol (RSTP) is an enhancement of STP. RSTP provides a faster spanning tree convergence after a topology change. STP can take 30 to 50 seconds to respond to a topology change while RSTP responds within three times the configured hello time and is backwards compatible with STP.
Load balancing is used to distribute the workload across multiple computers, network links, and various other resources to achieve proper resource utilization, maximize throughput, response time, and mainly avoid the overload.
Wi-Fi Protected Access (WPA and WPA2) are security protocols used for wireless networks to protect privacy by encrypting the transmitted data over the wireless network. WPA and WPA2 have improved authentication and encryption features compared to the Wired Equivalent Privacy (WEP) security protocol.
An Access Control List (ACL) is a list of network traffic filters and correlated actions used to improve security by either blocking or allowing users to access specific resources.
A MAC-based ACL is a type of ACL that is based on the source Media Access Control (MAC). If a packet is coming from a wireless access point to a LAN port or vice versa, this device will check if the source MAC address of the packet matches any entry in this list and checks the ACL rules against the content of the frame.
Hyper Text Transfer Protocol Secure (HTTPS) is a more secure protocol by which data is transferred between your browser and the website that you are connected to.
A rogue Access Point (AP) is an access point that has been installed on a network without explicit authorization from a system administrator. The Rogue AP Detection feature on your access point allows it to see these rogue APs that are within the range and it displays their information in the web-based utility.
Remote Authentication Dial-In User Service (RADIUS) is an authentication mechanism for devices to connect and use a network service. It is used for centralized authentication, authorization, and accounting purposes. A RADIUS server regulates access to the network by verifying the identity of the users through the login credentials entered.
The 802.1X IEEE standard was developed to provide security in Layer 2 of the Open Systems Interconnection (OSI) Model. It is composed of the following components: Supplicant, Authenticator, and Authentication Server. A Supplicant is the client or software that connects to a network and cannot have access to the network’s resources until it has been authenticated.
Quality of Service (QoS) allows you to prioritize traffic for different applications, users or data flows. It can also be used to guarantee performance to a specified level, thus, affecting the quality of service of the client. QoS is generally affected by the following factors: jitter, latency, and packet loss.
Wi-Fi Multimedia (WMM) is a QoS feature that assigns different process priorities to different types of traffic. It enhances the performance of the wireless network through setting the priority of the wireless data packet based on four categories: voice, video, best effort, and background. If an application does not require WMM, it is given lower priority than video and voice.
Traffic Specification (TSPEC) is a traffic specification that is sent from a QoS-capable wireless client to a WAP requesting a certain amount of network access for the Traffic Stream (TS) it represents.
The Client Quality of Service (QoS) Association is a section that provides additional options for customization of a wireless client’s QoS. These options include the bandwidth allowed to send, receive, or guaranteed. Client QoS Association can further be manipulated with the use of Access Control Lists (ACL).
Single Point Setup (SPS) is a simple, multi-device management technology that allows you to deploy and manage a group of the exact same access points. It offers the convenience of configuring a group of access points from a single point instead of configuring them individually. It also allows you to manage the access points locally or remotely.
Remote Management is manipulating the settings of a network device from a remote location using the Wide Area Network (WAN) IP of the device instead of the local IP, allowing network administrators to respond quickly to requests or challenges. This is typically done on devices like computers, switches, routers and many others that have an IP address.
Wireless Isolation prevents communication and file transfers between computers that are connected to different SSIDs. Traffic on one SSID will not be forwarded to any other SSIDs.
Advanced load balancing, better known as band steering, is a feature that detects devices capable of transmitting at 5 GHz band. This feature allows your access point to steer and direct devices to a more optimal radio frequency, thus, improving network performance.
Wireless Distribution System (WDS) is a feature which enables the wireless interconnection of access points in a network and enables the user to expand the network with multiple access points wirelessly. WDS also preserves the MAC addresses of client frames across links between access points.
Fast roaming between wireless access points permits a fast, secure, and uninterrupted wireless connectivity to achieve seamless mobile experience for real-time applications such as FaceTime, Skype, and Cisco Jabber.
Link Layer Discovery Protocol (LLDP) is a discovery protocol that is defined in the IEEE 802.1AB standard. LLDP allows network devices to advertise information about themselves to other devices on the network.
The Operating Mode is the ability of the WAP to act on different modes depending on how you want to use it. It can act as a single point-to-point mode access point, point-to-multipoint bridge, or as a repeater.
Bonjour allows an access point and its services to be discovered by using multicast Domain Name System (DNS). It advertises its services to the network and answers queries for the service types that it supports, simplifying network configuration in small business environments.
Captive Portal method forces LAN users or hosts on the network to see a special web page and would require authentication before users can access the public network normally.
A device with channel management enabled automatically assigns wireless radio channels to the other WAP devices in the cluster. The automatic channel assignment reduces interference with other access points outside of its cluster and maximizes Wi-Fi bandwidth to help maintain the efficiency of communication over the wireless network.
Event Logging is a feature that records activities or events in the system. It allows the administrator to keep track of particular events and is very useful for troubleshooting, system monitoring, and so on.
IPv4 is a 32-bit addressing system used to identify a device in a network. It is the addressing system used in most computer networks, including the Internet.
IPv6 is a 128-bit addressing system used to identify a device in a network. It is the successor to IPv4 and the most recent version of the addressing system used in computer networks.
Packet Capture is a feature of a network device that enables you to capture and store packets that are transmitted and received by the device. The captured packets can be analyzed by a network protocol analyzer such as Wireshark for troubleshooting or for optimization of network performance.
Simple Network Management Protocol (SNMP) is a network standard for storing and sharing information about network devices. SNMP facilitates network management, troubleshooting, and maintenance.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
13-Dec-2018 |
Initial Release |