User Manual

System Configuration
5-30
5
WMM BSS Parameters – These parameters apply to the wireless clients.
WMM AP Parameters – These parameters apply to the access point.
logCWMin (Minimum Contention Window) – The initial upper limit of the random
backoff wait time before wireless medium access can be attempted. The initial wait
time is a random value between zero and the CWMin value. Specify the CWMin
value in the range 0-15 microseconds. Note that the CWMin value must be equal
or less than the CWMax value.
logCWMax (Maximum Contention Window) – The maximum upper limit of the
random backoff wait time before wireless medium access can be attempted. The
contention window is doubled after each detected collision up to the CWMax value.
Specify the CWMax value in the range 0-15 microseconds. Note that the CWMax
value must be greater or equal to the CWMin value.
AIFS (Arbitration Inter-Frame Space) – The minimum amount of wait time before
the next data transmission attempt. Specify the AIFS value in the range
0-15 microseconds.
TXOP Limit (Transmit Opportunity Limit) – The maximum time an AC transmit
queue has access to the wireless medium. When an AC queue is granted a
transmit opportunity, it can transmit data for a time up to the TxOpLimit. This data
bursting greatly improves the efficiency for high data-rate traffic. Specify a value in
the range 0-65535 microseconds.
Admission Control – The admission control mode for the access category. When
enabled, clients are blocked from using the access category. (Default: Disable)
WLAN Security
The wireless AP/Router’s wireless interface is configured by default as an “open
system,” which broadcasts a beacon signal including the configured SSID. Wireless
clients with a configured SSID of “ANY” can read the SSID from the beacon, and
automatically set their SSID to allow immediate connection to the wireless network.
To improve wireless network security, you have to implement two main functions:
Authentication – It must be verified that clients attempting to connect to the
network are authorized users.
Traffic Encryption – Data passing between the unit and clients must be protected
from interception and eavesdropping.
For a more secure network, the wireless AP/Router can implement one or a
combination of the following security mechanisms:
Wired Equivalent Privacy (WEP)
IEEE 802.1X
Wi-Fi Protected Access (WPA) or WPA2