EasyManua.ls Logo

Alcatel-Lucent AOS-W 6.5.3.x - Guest Wlans

Alcatel-Lucent AOS-W 6.5.3.x
1160 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
446| Virtual APs AOS-W 6.5.3.x| User Guide
Parameter Description
Maximum VHT MPDU size Maximum size of a VHT MPDU.
Default: 11454 bytes.
Maximum number of MSDUs in an A-MSDU on
best-effort AC
Set the maximum number of MSDUs in a TX A-MSDU on best
effort AC.
Default: 2.
NOTE: In tunnel and decrypt-tunnel forwarding mode, TX A-
MSDU is disabled if the value is set to 0. If the value is set to
non-zero, TX A-MSDU is enabled and set to this value.
Maximum number of MSDUs in an A-MSDU on
background AC
Set the maximum number of MSDUs in a TX A-MSDU on
background AC.
Default: 2.
NOTE: TX A-MSDU is disabled if the value is set to 0. In
decrypt-tunnel forwarding mode, TX A-MSDU on background
AC is disabled and assigning any value has no effect.
Maximum number of MSDUs in an A-MSDU on
video AC
Set the maximum number of MSDUs in a TX A-MSDU on
video AC.
Default: 2.
NOTE: TX A-MSDU is disabled if the value is set to 0. In
decrypt-tunnel forwarding mode, TX A-MSDU on video AC is
disabled and assigning any value has no effect.
Maximum number of MSDUs in an A-MSDU on
voice AC
Set the maximum number of MSDUs in a TX A-MSDU on
voice AC.
Default: 0.
NOTE: TX A-MSDU is disabled if the value is set to 0. In
decrypt-tunnel forwarding mode, TX A-MSDU on voice AC is
disabled and assigning any value has no effect.
Table 106: High-Throughput SSID Profile Parameters
In order for the settings in this profile to take effect, the profile must be associated with an AP's Virtual AP
profile. For details on associating a high-throughput SSID profile with a Virtual APprofile, see Configuring the
Virtual AP Profile on page 413
In the CLI
(host)(config) #wlan ht-ssid-profile <profile-name>
Guest WLANs
Guest usage in enterprise wireless networks requires the following special consideration:
n Guest users must be separated from employee users by VLANs in the network.
n Guests must be limited not only in where they may go, but also by what network protocols and ports they
may use to access resources.
n Guests should be allowed to access only the local resources that are required for IP connectivity. These
resources include DHCP and possibly DNS if an outside DNS server is not available. In most cases, a public
DNS is always available.
n All other internal resources should be off limits for the guest. This restriction is achieved usually by denying
any internal address space to the guest user.

Table of Contents