User's Manual

10
In an ESS environment, users are able to move from one access point to another without losing
the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the
WPC-360A automatically switches to the channel used in BSS (2).
Wireless LAN Security
Because wireless networks are not as secure as wired networks, its vital that security settings
are clearly understood and applied.
The list below shows the possible wireless security levels on your WPC-360A starting with the
most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes
dynamic WEP key exchange. EAP requires interaction with a RADIUS (Remote Authentication
Dial-In User Service) server either on the WAN or the LAN to provide authentication service for
wireless stations.
1. Wi-Fi Protected Access (WPA)
2. IEEE802.1X EAP with RADIUS Server authentication
3. WEP Encryption
4. Unique ESSID
Roaming in an ESS network diagram
DO NOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A
NETWORK WITHOUT AUTHORIZATION AND WITHOUT CLEARLY UNDERSTANDING
THE SETTINGS YOU ARE APPLING.
WITH POOR SECURITY SETTINGS, SENSITIVE
DATA YOU SEND CAN BE SEEN BY OTHERS.