Language: English
Pages: 184
Contents......Page 3
Ordering Documentation......Page 12
Technical Assistance Center......Page 13
Cisco TAC Escalation Center......Page 14
WLAN Solution Benefits......Page 15
Enterprise WLAN Design Overview......Page 16
Enterprise WLAN Design Characteristics......Page 17
Unicast Traffic......Page 19
Multicast and Broadcast Traffic......Page 20
Ad-hoc Mode......Page 21
Security References......Page 22
IP Multicast References......Page 23
RF Basics......Page 25
Regulations......Page 26
Channel Selection......Page 29
IEEE 802.11 Standards......Page 33
IEEE 802.11b Direct Sequence Channels......Page 35
IEEE 802.11a Channels......Page 36
WLAN Data Rates Required......Page 37
Client Density and Throughput Requirements......Page 40
Security Policy......Page 41
RF Environment......Page 42
Competing WLAN Standards......Page 43
WLAN Capacity Considerations......Page 44
Data Rate Considerations......Page 45
Throughput Considerations......Page 46
Performance Considerations......Page 47
Range Considerations......Page 49
Antenna Considerations......Page 50
Technology Selection Summary......Page 51
Access Points......Page 53
Enhanced Client Network Management Features with Extended Client Support......Page 54
Workgroup Bridges......Page 55
Wireless Bridges......Page 56
Security Deployment Models......Page 59
Security Transparency......Page 60
WLAN LAN Extension IPSec......Page 61
Performance Transparency......Page 62
WLAN Static WEP Keys......Page 63
User Transparency......Page 64
Flexible WLAN Security using VLANs......Page 65
Headquarters/Campus WLAN Deployment......Page 66
Branch Office WLAN Deployment......Page 70
Additional Security Considerations......Page 71
EAP Considerations for High Availability ACS Architecture......Page 72
Example Architecture......Page 73
VLAN Background......Page 75
Wireless VLAN Deployment Overview......Page 77
Configuration Parameters per VLAN......Page 80
Native (Default) VLAN Configuration......Page 81
RADIUS-based VLAN Access Control......Page 82
Criteria for Wireless VLAN Deployment......Page 84
Wireless VLAN Deployment Example......Page 85
Best-Practices for the Wired Infrastructure......Page 87
QoS Overview......Page 89
Wireless QoS Deployment Schemes......Page 90
Downstream and Upstream QoS......Page 91
Interframe Spaces (SIFS, PIFS, and DIFS)......Page 92
Random Backoff (Contention Window)......Page 93
CWmin, CWmax, and Retries......Page 94
802.11e EDCF-based QoS Implementation......Page 95
QoS Advertisements by WLAN Infrastructure......Page 99
CoS-based Prioritization......Page 101
Class-Map Based Prioritization......Page 102
Combining QoS Setting Requirements......Page 103
Additional QoS Features......Page 104
Symbol Handsets......Page 105
Leveraging Existing Network QoS Settings......Page 106
WLAN Roaming......Page 107
Roaming Solution Overview......Page 108
Caveats......Page 109
Layer-2 Roaming Technical Overview......Page 110
Max Data Retry Count Exceeded......Page 111
Data Rate Shift......Page 112
Roam Process......Page 113
Layer-2 Roaming Considerations......Page 114
Cisco AVVID Design......Page 115
Roaming Implementation Recommendations......Page 116
Multicast WLAN Deployment Recommendations......Page 117
Controlling IP Multicast in a WLAN with APs......Page 118
Controlling IP Multicast in a P2P WLAN using Bridges......Page 119
Other Considerations......Page 120
Summary......Page 121
WLAN Rogue AP Detection and Mitigation......Page 123
Rogue AP Summary and Scope of Problem......Page 124
Media Attention to WLAN Security Weaknesses......Page 126
Truth About WLAN Security......Page 127
Preventing and Detecting Rogue APs......Page 128
IEEE 802.1x Port-based Security to Prevent APs......Page 129
How IEEE 802.1x Port Based Security Works......Page 130
802.1x Client Support......Page 131
Using Catalyst Switch Filters to Limit MAC Addresses per Port......Page 132
Detecting Rogue APs......Page 133
Installing Boingo......Page 134
Other Wireless Analyzers......Page 135
Detecting Rogue AP from the Wired Network......Page 137
Using MAC Addresses to Detect Rogue AP......Page 138
Using Operating System Fingerprinting to Detect Rogue APs......Page 139
Using Intrusion Detection to Detect Rogue APs......Page 140
Detecting Rogue APs Physically......Page 141
WLAN Guest Network Access......Page 143
Benefits of WLAN Guest Network Access......Page 145
Deployment Considerations and Caveats......Page 146
Recommended 802.11 Configuration for WLAN Guest Network......Page 147
VLANs and WLAN Implementation......Page 148
Network Topology......Page 149
AP and Switch Configuration......Page 150
Terminology Notes......Page 151
Configuring VLANs......Page 153
Configuring SSIDs......Page 154
AP 1100 Configuration......Page 156
Cisco AVVID Enterprise WLAN Case Study......Page 161
Enterprise WLAN Profile......Page 162
RF Environment......Page 163
Multicast......Page 164
Estimating the Number of APs......Page 165
Security Selection......Page 167
Number of ACS Servers......Page 168
ACS Server Placement......Page 169
Branch Roaming......Page 170
Management......Page 171
Layer-2 and Layer-3 Roaming......Page 172
IP Multicast......Page 174
AP Configuration......Page 175
Distribution Router Configuration......Page 176