Honeywell Marathon User Manual page 57

Hide thumbs Also See for Marathon:
Table of Contents

Advertisement

Default
Property
Value
Aggressive
On
Scan
CCX
Optimized
Features
WMM
Off
Auth Server Type 1
TTLS Inner
Auto-EAP
Method
PMK Cach-
Standard
ing
TX Diversity On
RX Diversity On-start on
Main
Frag Thresh 2346
RTS Thresh 2347
LED
Off
Explanation
When set to On and the current connection to an AP weakens, the radio ag-
gressively scans for available APs.
Aggressive scanning works with standard scanning (set through Roam Trig-
ger, Roam Delta and Roam Period). Aggressive scanning should be set to
On unless there is significant co-channel interference due to overlapping
APs on the same channel.
Options are: On, Off
Use of Cisco Compatible Extensions (CCX) radio management and AP
specified maximum transmit power features.
Options are:
Full - Use Cisco IE and CCX version number, support all CCX features. The
option known as "On" in previous versions.
Optimized –Use Cisco IE and CCX version number, support all CCX fea-
tures except AP assisted roaming, AP specified maximum transmit power
and radio management.
Off - Do not use Cisco IE and CCX version number.
Cisco IE = Cisco Information Element.
Use of Wi-Fi Multimedia extensions.
Specifies the type of authentication server.
Options are: Type 1 (ACS server) and Type 2 (non-ACS server)
Authentication method used within the secure tunnel created by EAP-TTLS.
Options are:
AUTO-EAP (Any available EAP method), MSCHAPV2, MSCHAP, PAP
CHAP, EAP-MSCHAPV2
Type of Pairwise Master Key (PMK) caching to use when WPA2 is in use.
PMK caching is designed to speed up roaming between APs by allowing the
client and the AP to cache the results of 802.1X authentications, eliminating
the need to communicate with the ACS server. Standard PMK is used when
there are no controllers. The reauthentication information is cached on the
original AP. The client and the AP use the cached information to perform the
four-way handshake to exchange keys. Opportunistic PMK (OPMK) is used
when there are controllers. The reauthentication information cached on the
controllers. The client and the controller behind the AP use the cached in-
formation to perform the four-way handshake to exchange keys.
If the selected PMK caching method is not supported by the network infra-
structure, every roam requires full 802.11X authentication, including interac-
tion with the ACS server.
If the active profile is using WPA2 CCKM, the global PMK Caching setting
is ignored and the client attempts to use CCKM.
Options are: Standard, OPMK
How to handle antenna diversity when transmitting packets to the Access
Point.
Options are: Main only, Aux only, and On.
How to handle antenna diversity when receiving packets from the Access
Point.
Options are: Main only, Aux only, On-start on main, and On-start on Aux.
If the packet size (in bytes) exceeds the specified number of bytes set in the
fragment threshold, the packet is fragmented (sent as several pieces in-
stead of as one block). Use a low setting in areas where communication is
poor or where there is a great deal of wireless interference.
Options are: Any number between 256 bytes and 2346 bytes.
If the packet size exceeds the specified number of bytes set in the Request
to Send (RTS) threshold, an RTS is sent before sending the packet. A low
RTS threshold setting can be useful in areas where many client devices are
associating with the Access Point.
This parameter cannot be changed.
The LED on the wireless card is not visible to the user when the wireless
card is installed in a sealed mobile device.
Options are: On, Off.
6 - 7

Advertisement

Table of Contents
loading

Table of Contents