Ethernet; Security - Proxim ORiNOCO AP-8000 User Manual

Hide thumbs Also See for ORiNOCO AP-8000:
Table of Contents

Advertisement

Access Point Features
Guard Interval: Guard Interval ensures that distinct transmissions do not interfere with one another. This feature
provides immunity to users. Each user is allotted a time slot to transmit their data and this time slot ends with the
guard interval.
Tx Antennas: This parameter enables the transmission antennas. This is configured as bit-mask. E.g.: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
Rx Antennas: This parameter enables the receiving antennas. This is configured as bit-mask. E.g.: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
The bottom enclosure of the device will display R and A with specific numbers, where R stands for Radio and A stands for
Antenna.
Decimal
1
2
3
4
5
6
7

Ethernet

The Ethernet feature provide the feasibility to view MAC address of the Ethernet Interface, speed and the mode of
transmission.
Ethernet Features
MAC Address: This parameter represents the MAC address of the Ethernet interface.
Speed: This parameter displays the speed of the Ethernet interface.
Transmit: This parameter displays the transmit mode of the Ethernet interface.
TxMode And Speed: This Parameter represents the Transmit Mode and Speed of the Ethernet interface.

Security

AP supports the following security features.
Wired Equivalent Privacy (WEP) Encryptions
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy (WEP), that is
designed to provide a wireless LAN with a security level equal to what is found on a Wired Ethernet Network. WEP
encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a
WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be
configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device
is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a Ethernet
port. A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a
wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol
(EAP) as a standards-based authentication framework, and supports automatic key distribution for enhanced security.
The EAP-based authentication framework can easily be upgraded to keep pace with future EAP types.
Binary
Active Antennas
001
First Antenna
010
Second Antenna
011
First and Second Antenna
100
Third Antenna
101
Third and First Antenna
110
Third and Second Antenna
111
First, Second and Third Antenna
AP-8000 User Guide
Marking of the Enclosure
A1
A2
A1 and A2
A3
A3 and A1
A3 and A2
A1, A2,a nd A3
38

Advertisement

Table of Contents
loading

Table of Contents