D-Link DWL-2200AP [107/192] Backup links and unwanted loops in wds bridges

107
Backup Links and Unwanted Loops in WDS Bridges
Another use for WDS bridging, the creation of backup links, is not supported in this
release of the D-Link DWL-2210AP. The topic is included here to emphasize that you
should not try to use WDS in this way; backup links will result in unwanted, endless
loops of data traffic.
If an access point provides Spanning Tree Protocol (STP), WDS can be used to configure
backup paths between access points across the network. For example, between two
access points you could have both a primary path via Ethernet and a secondary (backup)
wireless path via a WDS link. If the Ethernet connection goes down, STP would reconfigure
its map of the network and effectively fix the down network segment by activating the
backup wireless path.
The D-Link DWL-2210AP does not provide STP for this release. Without STP, it is possible
that both connections (paths) may be active at the same time, and result in an endless
loop of traffic on the LAN.
Therefore, be sure not create loops with either WDS bridges or combinations of Wired
(Ethernet) connections and WDS bridges.
For more information, see the “Do not create loops” note under “Configuring WDS Settings”
in this manual.
Security Considerations Related to WDS Bridges
Static Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless
networks. Both access points in a given WDS link must be configured with the same
security settings. For static WEP, either a static 64-bit (40-bit secret key + 24-bit
initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key is specified
for data encryption.
You can enable Static WEP on the WDS link (bridge). When WEP is enabled, all data
exchanged between the two access points in a WDS link is encrypted using a fixed
WEP key that you provide.
Static WEP is the only security mode available for the WDS link, and it does not provide
effective data protection to the level of other security modes available for service to client
stations. If you use WDS on a LAN intended for secure wireless traffic you are putting
your network at risk. Therefore, we recommend using WDS to bridge the Guest network
only for this release. Do not use WDS to bridge access points on the Internal network
unless you are not concerned about the security risk for data traffic on that network.
For more information about the effectiveness of different security modes, see “Configuring
Security” in this manual. This topic also covers use of plain text security mode for AP-to-
station traffic on the Guest network, which is intended for less sensitive data traffic.
Configuring the Wireless Distribution System (WDS)

Содержание

Скачать