Moxa Technologies MOXA AirWorks User Manual
MOXA AirWorks AWK-1100 User’s Manual
Web Console Configuration
3-15
WARNING
Be sure to eliminate loops from networks that consist of wireless bridges, Ethernet switches,
Ethernet links, and WDS links. If any loops exist, packets will circle around the loops and
network performance will be seriously degraded.
Ethernet links, and WDS links. If any loops exist, packets will circle around the loops and
network performance will be seriously degraded.
Network topology containing a loop
Security
IEEE 802.11g security settings include SSID broadcasts, Wireless client isolation, Security
mode, IEEE 802.11 Authentication algorithm, WEP keys, MAC-Address-Based Access
Control.
mode, IEEE 802.11 Authentication algorithm, WEP keys, MAC-Address-Based Access
Control.
Basic
For security reasons, it is highly recommended that the security mode be set to options other than
Open System. When the security mode is set to Open System, no authentication or data
encryption will be performed. In addition, you can disable the SSID broadcast functionality so that
a wireless client computer with an SSID set to “any” cannot associate with the AWK-1100.
Open System. When the security mode is set to Open System, no authentication or data
encryption will be performed. In addition, you can disable the SSID broadcast functionality so that
a wireless client computer with an SSID set to “any” cannot associate with the AWK-1100.
When the Wireless client isolation setting is set to This AP Only, wireless clients of this AP
cannot see each other, and wireless-to-wireless traffic is blocked. When the setting is set to All
APs in this Subnet, traffic among wireless users from different APs in the same IP subnet is
blocked. This feature is useful for WLANs deployed in public places. In this way, hackers have no
chance to attack other wireless users in a hotspot. The behaviors are illustrated in the following
figures.
cannot see each other, and wireless-to-wireless traffic is blocked. When the setting is set to All
APs in this Subnet, traffic among wireless users from different APs in the same IP subnet is
blocked. This feature is useful for WLANs deployed in public places. In this way, hackers have no
chance to attack other wireless users in a hotspot. The behaviors are illustrated in the following
figures.