摘要 |
Described herein are techniques for selecting a subset of access points. In an example, a wireless access point stores a plurality of unique keys, each unique key being associated with a respective device. The access point advertises a first service set identifier, the first service set identifier requiring authentication of a device requesting connection at a remotely located authentication server. The access point monitors a connection to the remotely located authentication server, and, in response to the connection going down, advertising a second service set identifier, the second service set identifier requiring authentication of a device requesting connection using the unique key associated with the device requesting connection. |