现在让我们看看为Cisco无线访问点而进行的配置。
Now let's look at configuring for a Cisco wireless access point.
下面的代码处理相同的任务,这一次是对于Cisco无线访问点。
The following code handles the same task for a Cisco wireless access point.
计算机的无线网络硬件是无线访问点,不是无线网络适配器。
Your computer's wireless hardware is a wireless access point, not a wireless network adapter.
这些用户可能通过在会议室或办公室的有线端口连接网络,也可能通过无线访问点来连接网络。
These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points.
一个无线访问点对内部的所有用户都是公开的,入侵者及不受信任的用户可以很容易的进入无线网络访问各种资源。
Because a wireless access point is public to all inside user, intruder and distrustful user can enter wireless network to access all kinds of source easily.
例如,考虑一个典型的家庭网络,其中有四台计算机连接到无线访问点(WAP),或者通过电缆或dsl调制解调器向外连接的路由器。
For example, consider a typical home network with four computers connected to a wireless access point (WAP) or router with an outbound connection through a cable or DSL modem.
RADIUS客户机是网络访问服务器,它通常是一个路由器、交换机或无线访问点(访问点是网络上专门配置的节点;wap是无线版本)。
The RADIUS client, the network access server, is typically a router, switch, or wireless access point (access points are specially configured nodes on networks; WAPs are wireless versions).
访问点的无线卡会生成一个非常微弱的信号,因此,为了将信号丢失的情况降至最低,我希望能够将天线做得尽可能的短。
An access point's wireless card generates a very weak signal, so to minimize signal loss I wanted the antenna cable to be as short as possible.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
应用推荐