
64
Configuring the Access Point
Configuring Wireless Settings
4. When you are finished, click Update Settings to save and apply the changes. A
confirmation message appears at the top of this page.
5. Click Go back to Wireless Configuration to reopen the previous page.
Using WEP
Wired Equivalent Privacy (WEP) is a security algorithm for 802.11 wireless networks
designed to provide data confidentiality comparable to that of a wired network. WEP
uses a pre-shared key for encrypting data frames that is shared among all users of the
wireless network. For this reason and others, WEP has been discredited as a security
mechanism and should be avoided in favor of WPA if at all possible.
CAUTION: WEP encryption has been proven to be easily circumvented. Therefore,
Ruckus Wireless recommends using WPA whenever possible, and only use WEP if your
client devices do not support WPA.
Local Subnet This option appears if you have selected Local Subnet NAT
and Route to WAN under Packet Forwarding, and allows
you to choose which subnet this WLAN’s traffic will be part
of. You must have previously configured a subnet from the
Configuration > Local Subnets page before it becomes
available here.
Access VLAN Enter a VLAN ID to segment all traffic arriving from this
WLAN to a specified VLAN. Default is 1.
Dynamic VLAN This setting is available only with WPA encryption and
802.1X authentication. Dynamic VLAN allows the dynamic
assignment of VLANs to clients based on RADIUS
attributes. Enable this option only if your RADIUS server is
configured to segment clients using dynamic VLAN.
DHCP Option 82 When this option is enabled on an SSID, the SSID will be
inserted into the DHCP request packet’s Agent Circuit sub-
option, and the AP’s base MAC address will be inserted as
the Agent Remote ID sub-option.
Encryption Method By default, all data exchanges on your wireless network are
not encrypted, but you can select an encryption method in
this option, and use the extra workspace features that
appear to fine-tune the encryption settings.
Ruckus Wireless strongly recommends using WPA as the
encryption method as WEP has been proven to be easily
circumvented.
For more information, see either “Using WEP”
on page 64
or “Using WPA” on page 66.
Kommentare zu diesen Handbüchern