Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cisco WDS on Access Points

Posted on 2012-03-28
3
Medium Priority
?
886 Views
Last Modified: 2012-03-29
Hopefully a quick question, I am looking at putting in about 4 Access points in a warehouse environment. I read about Wireless Domain Services (WDS) and was wodnering
1. Roaming between AP's will a SSH session drop? For example the wireless devices create a SSH connection to a remote server, when the users and devices move around the warehouse and go from AP to AP will the SSH connection drop if WDS is enabled and configured?
0
Comment
Question by:damte
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 1200 total points
ID: 37781069
As long as you use the same SSID and security settings on each AP, and configure WDS correctly your SSH session will stay up.
0
 

Author Comment

by:damte
ID: 37781825
For my security setting can I keep it as simple as using WPA2 with MAC address filtering on each AP? I guess what I am asking is, I don't need a radius server to use WDS, do I?

The devices will be on their own Subnet with only outbound access to Port 22 to a specific host. This is a also at a farm/warehouse so there aren't many people around to worry about.
0
 
LVL 47

Expert Comment

by:Craig Beck
ID: 37781875
No you don't need a RADIUS server - WDS will work with pre-shared keys.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question