24 WSS overviewNN47250-301 (320656-D Version 01.02)• Simple Network Management Protocol (SNMP)—A WSS can be configured to generate SNMP traps formajor system events.Authentication, authorization, and accounting• 802.1X—A WSS can authenticate users based on 802.1X protocols. Based on authentication, users areassigned VLAN membership, access control, and roaming boundaries.• MAC authentication—If a device does not support 802.1X, you can configure authentication based on thesource MAC address to assign VLAN membership, access control, and roaming boundaries.• Guest authentication—Guests can be authenticated by a shared set of authorization attributes that assignVLAN membership, access control, and roaming boundaries.• Local and remote authentication—You can authenticate users locally using information configured on theWSS, or use a Remote Authentication Dial-In User Service (RADIUS) server. When you use a remoteserver, the WSS can enhance performance by performing some of the AAA tasks locally or distributingthe load across multiple servers.Roaming• AP roaming—You can configure the WSS to allow users to roam from one AP to another on the sameWSS.• Mobility Domain™ roaming—You also can configure a group of WSSs to allow users to roam from oneswitch to another. Regardless of the wired subnet connections, each user maintains the same IP addressand session across the network.• Session management—You can display session information and statistics for users.RF management• RF Auto-Tuning—WSS Software can automatically assign channels and power settings to APs based onRF information collected from the network.• Radio frequency (RF) topology—With WLAN Management Software , you can verify site coverage andcapacity.• Rogue detection and countermeasures—APs can be used to gather RF information for validating an RFdeployment plan, and for detecting and combatting rogue access points.• User-based RF—You can gather statistics on a per-user basis as users roam across the network.