Specifications
4-4
Cisco Aironet Access Point Software Configuration Guide
OL-0657-07
Chapter 4 Configuring VLANs
VLAN Security Policy
Optionally allow Encrypted packets on the unencrypted VLAN
Determines whether the access point passes encrypted packets on an unencrypted VLAN. This setting
permits a client device to associate to the access point allowing both WEP and non-WEP associations.
VLAN ID
A unique number that identifies a VLAN. This number must match VLANs set on the switch. The setting
is configured by the user.
VLAN Name
A unique name for a VLAN configured on the access point. This setting is configured by the user. The
VLAN name is for information only and is not used by the switch or access point as a parameter for
determining the destination of data.
Existing VLANs
A list of successfully configured VLANs on the access point. As the user configures VLANs, they appear
in this list by ID number and name. From this list, you can edit or remove a VLAN.
VLAN Security Policy
You can define a security policy for each VLAN on the access point. This enables you to define the
appropriate restrictions for each VLAN you configure. The following parameters can be configured on
the wireless VLAN:
• SSID Name—a unique name for each wireless VLAN
• Default VLAN ID—VLAN ID mapping on the wired side
• Authentication types—Open, Shared, and Network-EAP
• MAC authentication—Under Open, Shared, and Network-EAP
• EAP authentication—Under Open, Shared, and Network-EAP
• Maximum number of associations—ability to limit maximum number of wireless clients per SSID
The following parameters can be configured on the wired VLAN:
• Encryption key—the key used for broadcast or multicast segmentation per VLAN. This key is also
used for static WEP clients for both unicast and multicast traffic
• Enhanced MIC verification for WEP—ability to enable MIC per VLAN
• Temporal Key Integrity Protocol (TKIP)—ability to enable per packet key hashing for each VLAN
• WEP key rotation interval—ability to enable WEP key rotation for each VLAN but supported only
for wireless VLANs with IEEE 802.1x protocols enabled (such as LEAP, EAP-TLS, PEAP, etc.)
• Default Policy Group—ability to apply a policy group (set of Layer 2, 3, and 4 filters) for each
VLAN. Each filter within a policy group can be configured to allow or deny a certain type of traffic
• Default Priority—ability to apply default CoS for each VLAN