Technical data

204 Meru System Director Configuration Guide © 2012 Meru Networks, Inc.
More About VLANs
in the Security chapter. VLANs and GRE tunnels can coexist within any given network,
logically segmenting traffic by organization or function. In this way, all systems used
by a given organization can be interconnected, independent of physical location.
This has the benefit of limiting the broadcast domain and increasing security.
VLANs, when used in conjunction with multiple ESSIDs, as discussed in Chapter 5,
“Configuring an ESS,” allow you to support multiple wireless networks on a single
access point. You can create a one-to-one mapping of ESSID to VLAN or map multiple
ESSIDs to one VLAN.
Customized security configuration by VLAN is also supported. By assigning a VLAN a
Security Profile, you can fine-tune the security requirements based on the use of the
VLAN (see Chapter 8, “Configuring Security,” for details).