Key to wireless LAN switching technology is the ability to maintain user identity across the wireless infrastructure so services and security can be delivered seamlessly to users or user groups from access point to access point.Wireless LAN switching centralizes control of access points and wireless switching much like intelligent switching did for the wired world. The technology provides a structured blueprint and centralized troubleshooting tools needed to scale and secure wireless LANs beyond departments and across a corporation.In the current wireless LAN model, access points act as isolated systems providing 802.11 functions such as encryption and authentication. Wireless LAN switching moves these functions into a switch in order to more simply manage and upgrade large wireless infrastructures. Access points connected to the wireless switch then become Ethernet radios that require virtually no management.Key to wireless LAN switching technology is the ability to maintain user identity across the wireless infrastructure so services and security can be delivered seamlessly to users or user groups from access point to access point. A wireless user accesses the network by attempting to make an association with the access point that has the strongest signal. That access point is connected to a wireless switch in the wiring closet or data center. Acting as a repeater, the access point forwards the 802.11 association request to the wireless LAN switch, which in turn acknowledges the request. The wireless LAN switch authenticates the wireless user via the 802.1x protocol – validating user credentials through Remote Access Dial In User Service (RADIUS).Once the authentication phase is complete, a RADIUS server passes encryption keys to the wireless LAN switch. The client independently derives the keys on his own and begins sending encrypted data. Use of wireless switches gives network managers the flexibility to mix and match client security capabilities ranging from Layer 3 VPNs to Layer 2 authentication and encryption schemes such as 802.1x, Wireless Equivalent Privacy, Temporal Key Integrity Protocol and Advanced Encryption Standard without having to upgrade or reconfigure access points.Wireless switches serve as the brains of a wireless LAN system by constantly monitoring air space, network growth and user density, and dynamically adjusting bandwidth, access control, quality of service and other parameters as mobile users roam through the corporation.The technology is unique in its ability to control each access point’s power and channel settings, and store configuration data. For instance, when an access point failure occurs, the wireless LAN switch automatically detects the failure and instructs nearby access points to adjust power and channel settings to compensate. When a new access point is installed, it is automatically discovered by a wireless LAN switch that uploads the appropriate power and channel settings.Wireless LAN switching technology also can protect against the security threat of rogue access points. When a rogue access point is plugged into the network, wireless LAN switches validate the device with a trusted list of allowed devices, users and user policies. If the switch determines the device is “illegal,” it proactively shuts down the rogue access point and automatically alerts the network manager.With wireless LANs, network managers also face challenges in combining security with mobility. Wireless LAN switching technology integrates mobile IP, a standard that solves roaming issues across IP subnets, while maintaining user authentication state, and transparently reauthenticates users as they move to another access point.Stateful policy engines enforce predefined rules on a per-user basis. As users move, their policies follow. With these capabilities, network managers can provide some users, such as guests, with only HTTP access, while employees receive access to a wider range of TCP ports and services. With its roots established in the structured wired architectures of the past, Wi-Fi switching gives IT a similar control model, bringing with it a new way to manage change for enterprise wireless networks. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Technology Industry Markets news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Mainframes Mainframes Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe