Wireless Access Point
525
number of users — in this case, enter the MAC addresses of each
user in the Allow list. In the event of a lost or stolen MAC
adapter, enter the affected MAC address in the Deny list.
Q. Why do I need to authenticate my Wireless AP units?
A. When deploying multiple Wireless APs, you may need to define which
units are part of which wireless network (for example, if you are
establishing more than one network). In this case you need to employ the
XMS, which can authenticate your APs automatically and ensure that
only authorized units are associated with the defined wireless network.
Q. What is rogue AP (Access Point) detection?
A. The Wireless AP has integrated monitor capabilities, which can
constantly scan the local wireless environment for rogue APs (non-Xirrus
devices that are not part of your wireless network), unencrypted
transmissions, and other security issues. Administrators can then classify
each rogue AP and ensure that these devices do not interrupt or interfere
with the network.
See Also
General Hints and Tips
Multiple SSIDs
VLAN Support
VLAN Support
Q. What Are VLANs?
A. Virtual Local Area Networks (VLANs) are a logical grouping of network
devices that share a common network broadcast domain. Members of a
particular VLAN can be on any segment of the physical network but
logically only members of a particular VLAN can see each other.
VLANs are defined and implemented using the wired network switches
that are VLAN capable. Packets are tagged for transmission on a