The access point supports up to four Virtual Access Points per physical radio interface, that is four on the 802.11a radio and four on the 802.11g radio. This allows traffic to be separated for different user groups using an access point that services one area.
1. One Wireless Outdoor Access Point 2. One Mounting Kits 3. One 48W PoE Adapter 4. One User Guide CD Inform your dealer if there are any incorrect, missing or damaged parts Hardware Description Wireless Outdoor Access Point 48V Power Over Ethernet Adapter...
• Provides seamless roaming within the IEEE 802.11a, 802.11b and 802.11g WLAN environment • Scans all available channels and selects the best channel for each client based on the signal-to-noise ratio • Allows the country of operation to be set to match regulatory requirements (for...
Introduction System Defaults The following table lists some of the access point’s basic system defaults. Table 1-1. System Defaults Feature Parameter Default Identification System Name Enterprise Wireless AP Administration User Name admin Password Null (no passowrd) General HTTP Server Enabled...
Page 8
System Defaults Table 1-1. System Defaults Feature Parameter Default MAC Authentication Disabled Authentication Session Timeout 0 minutes (disabled) Local MAC System Default Allowed Local MAC Permission Allowed 802.1X Authentication Status Disabled Broadcast Key Refresh 0 minutes (disabled) Session Key Refresh...
Page 9
SNTP Server Status Enabled SNTP Server 1 IP 137.92.140.80 SNTP Server 2 IP 192.43.244.18 Date and Time 00:00, Jan 1, 1970 (when there is no time server) Daylight Saving Time Disabled Time Zone GMT-5 (Eastern Time, US and Canada) Ethernet Interface...
Page 10
Full Max Station Data Rate 54 Mbps Multicast Data Rate 6 Mbps Beacon Interval 100 TUs Data Beacon Rate (DTIM Interval) 1 beacon RTS Threshold 2347 bytes Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection...
Page 11
Max Station Data Rate 54 Mbps Multicast Data Rate 5.5 Mbps Preamble Length Long Beacon Interval 100 TUs Data Beacon Rate (DTIM Interval) 1 beacon RTS Threshold 2347 bytes Association Timeout Interval 30 minutes Authentication Timeout Interval 60 minutes Rogue AP Detection...
Page 12
System Defaults Table 1-1. System Defaults Feature Parameter Default Link Integrity Status Disabled Ping Interval 30 seconds Fail Retry Count 1-11...
Access Point also provides repeater and bridging services that can be configured independently on either the 5 GHz or 2.4 GHz radio interfaces. Access points can be deployed to support wireless clients and connect wired LANs in the following configurations: •...
LAN. Computers in a specific ad hoc wireless LAN must therefore be configured to the same radio channel. An ad hoc wireless LAN can be used for a branch office or SOHO operation.
Service Set (BSS) consists of a group of wireless PC users, and an access point that is directly connected to the wired LAN. Each wireless PC in this BSS can talk to any computer in its wireless group via a radio link, or access other computers or network resources in the wired LAN infrastructure via the access point.
The BSS ID is only set by the access point, never by its clients. The clients only need to set the Service Set Identifier (SSID) that identifies the service set provided by one or more access points.
2.4 GHz (802.11b/g) bands and can be used with various external antennas to offer flexible deployment options. Up to six WDS bridge links can be specified for each unit in the wireless bridge network. One unit only must be configured as the “root bridge” in the wireless network.
The access point supports up to six WDS repeater links. In repeater mode, the access point does not support an Ethernet link to a wired LAN. Note that when the access point operates in this mode only half the normal throughput is possible.
The initial configuration steps can be made through the web browser interface or CLI. The access point requests an IP address via DHCP by default. If no response is received from the DHCP server, then the access point uses the default address 192.168.2.2 If this address is not compatible with your network, you can first use the...
Page 21
Logging In Logging In There are only a few basic steps you need to complete to connect the access point to your corporate network, and provide network access to wireless clients. The access point can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape 6.2 or above).
Page 22
Initial Configuration The home page displays the Main Menu.
Chapter 6: System Configuration Before continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 to set up an IP address for the access point. The access point can be managed by any computer using a web browser (Internet Explorer 5.0 or above, or Netscape 6.2 or above).
Configures SNMP settings 6-38 SNMP Controls access to this access point from management stations 6-38 using SNMP, as well as the hosts that will receive trap messages SNMP Trap Filters Defines trap filters for SNMPv3 users 6-46 SNMP Targets Specifies SNMPv3 users that will receive trap messages...
Shows log messages stored in memory 6-91 System Identification The system name for the access point can be left at its default setting. However, modifying this parameter can help you to more easily distinguish different devices in your network. System Name – An alias for the access point, enabling the device to be uniquely...
Page 26
IP configuration, if needed. Note: If there is no DHCP server on your network, or DHCP fails, the access point will automatically start up with a default IP address of 192.168.2.2.
Page 27
• Subnet Mask: The mask that identifies the host address bits used for routing to specific subnets. • Default Gateway: The default gateway is the IP address of the router for the access point, which is used if the requested destination address is not on the local subnet.
Page 28
An authentication server contains a database of user credentials for each user that requires access to the network. A primary RADIUS server must be specified for the access point to implement IEEE 802.1X network access control and Wi-Fi Protected Access (WPA) wireless security.
Page 30
VLAN ID Format – A VLAN ID (a number between 1 and 4094) can be assigned to each client after successful authentication using IEEE 802.1X and a central RADIUS server.
Advanced Configuration SSH Settings Telnet is a remote management tool that can be used to configure the access point from anywhere in the network. However, Telnet is not secure from hostile attacks. The Secure Shell (SSH) can act as a secure replacement for Telnet. The SSH...
Page 32
MAC addresses can be manually configured on the access point itself without the need to set up a RADIUS server, but managing a large number of MAC addresses across many access points is very cumbersome. A RADIUS server can be used to centrally manage a larger database of user MAC addresses.
Page 33
Use the Local MAC Authentication section of this web page to set up the local database, and configure all access points in the wireless network service area with the same MAC address database.
Page 34
• MAC Address: Physical address of a client. Enter six pairs of hexadecimal digits separated by hyphens; for example, 00-90-D1-12-AB-89. • Permission: Select Allow to permit access or Deny to block access. If Delete is selected, the specified MAC address entry is removed from the database.
Advanced Configuration Filter Control The access point can employ network traffic frame filtering to control access to network resources and increase security. You can prevent communications between wireless clients and prevent access point management from wireless clients. Also, you can block specific Ethernet traffic from being forwarded by the access point.
Page 36
• Disabled: Access point does not filter Ethernet protocol types. • Enabled: Access point filters Ethernet protocol types based on the configuration of protocol types in the filter table. If the status of a protocol is set to “ON,” the protocol is filtered from the access point.
Page 37
RADIUS server to be assigned to each client. If a client is not assigned to a specific VLAN or if 802.1X is not used, the client is assigned to the default VLAN for the VAP interface with which it is associated. The access point only allows traffic tagged with assigned VLAN IDs or default VLAN IDs to access clients associated on each VAP interface.
Page 38
Advanced Configuration When setting up VLAN IDs for each user on the RADIUS server, be sure to use the RADIUS attributes and values as indicated in the following table. Number RADIUS Attribute Value Tunnel-Type VLAN (13) Tunnel-Medium-Type Tunnel-Private-Group-ID VLANID (1 to 4094 as hexadecimal or string) VLAN IDs on the RADIUS server can be entered as hexadecimal digits or a string (see “radius-server vlan-format”...
“Parent” link to the root bridge or to a bridge connected to the root bridge. The other five WDS links are available as “Child” links to other bridges. • Bridge Role – Each radio interface can be set to operate in one of the following four modes: (Default: AP) •...
Page 40
• Root Bridge: Operates as the root bridge in the wireless bridge network. Up to six ”Child” links are available to other bridges in the network. • Bridge Parent – The physical layer address of the root bridge unit or the bridge unit connected to the root bridge. (12 hexadecimal digits in the form “xx-xx-xx-xx-xx-xx”)
Page 41
(STP-compliant switch, bridge or router) that serves as the root of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device.
Page 42
Any port that ages out STP information (provided in the last configuration message) becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network. (Range: 6-40 seconds) •...
Page 43
• Link Port Priority – Defines the priority used for this port in the Spanning Tree Protocol. If the path cost for all ports on a switch are the same, the port with the highest priority (i.e., lowest value) will be configured as an active link in the spanning tree.
Page 44
• Any IP: Indicates that any IP address is allowed management access. • Single IP: Specifies a single IP address that is allowed management access. • Multiple IP: Specifies an address range as defined by the entered IP address and subnet mask. For example, IP address 192.168.2.6 and subnet mask 255.255.255.0, defines all IP addresses from 192.168.2.2 to 192.168.2.254.
“admin” user name from the system. Note: Pressing the Reset button on the back of the access point for more than five seconds resets the user name and password to the factory defaults. For this reason, we recommend that you protect the access point from physical access by unauthorized persons.
System Configuration Setting the Timeout Interval You can set the timeout interval for web access to the unit, after which the user will have to re-enter the username and password. Session Timeout for WEB – Sets the time limit for an idle web interface session.
Page 47
FTP or TFTP server is associated, and then configure the management station, or the network port to which it is attached, with the same VLAN ID. If you are managing the access point from a wireless client, the VLAN ID for the wireless client must be configured on a RADIUS server.
Page 48
“myfolder/syscfg.” Other than to indicate a path, the file name must not contain any slashes (\ or /), the leading letter cannot be a period (.), and the maximum length for file names on the FTP/TFTP server is 255 characters.
Page 49
Advanced Configuration Upon uploading a new configuration file you will be prompted to either restore factory settings, or reboot the unit. 6-33...
Enabling System Logging The access point supports a logging process that can control error messages saved to memory or sent to a Syslog server. The logged messages serve as a valuable tool for isolating access point and network problems. System Log Setup – Enables the logging of error messages. (Default: Disable) Server (1-4) –...
Page 51
Debug Debugging messages Note: The access point error log can be viewed using the Event Logs window in the Status section (page 6-91). The Event Logs window displays the last 128 messages logged in chronological order, from the newest to the oldest. Log messages saved in the access point’s memory are erased when the device is...
If the clock is not set, the access point will only record the time from the factory default set at the last bootup.
Page 53
Advanced Configuration Note: The access point also allows you to disable SNTP and set the system clock manually. Set Time Zone – SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude.
Page 54
Managed devices supporting SNMP contain software, which runs locally on the device and is referred to as an agent. A defined set of variables, known as managed objects, is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base (MIB) that provides a standard presentation of the information controlled by the agent.
SNMP Configuring SNMP and Trap Message Parameters The access point SNMP agent must be enabled to function (for versions 1, 2c, and 3 clients). Management access using SNMP v1 and v2c also requires community strings to be configured for authentication. Trap notifications can be enabled and sent to up to four management stations.
Page 56
ID is automatically generated that is unique to the access point. (Range: 10 to 64 hexadecimal characters) Note: If the local engine ID is deleted or changed, all SNMP users will be cleared. All existing users will need to be re-configured. If you want to change the default engine ID, change it first before configuring other SNMP v3 parameters.
Page 57
• iappContextDataSent - A client station’s Context Data has been sent to another access point with which the station has associated. • sntpServerFail - The access point has failed to set the time from the configured SNTP server. • wirelessExternalAntenna - An external antenna has been enabled.
Page 58
• dot11StationAuthenticateFail - A client station has tried and failed to authenticate to the network. • Enable All Traps - Click the button to enable all the available traps. • Disable All Traps - Click the button to disable all the available traps.
A minimum of eight plain text characters is required. Action – Click the Add button to add a new user to the list. Click the edit button to change details of an existing user. Click the Del button to remove a user from the list.
(see below). To edit an existing filter, select the radio button next to the entry in the table and then click the Edit button. To delete a filter, select the radio button next to the entry in the table and then click the Delete button.
Page 61
Filter Type – Indicates if the filter is to “include” or “exclude” the MIB subtree objects from the filter. Note that MIB objects included in the filter are not sent to the receiving target and objects excluded are sent. By default all traps are sent, so you can first use an “include”...
(see below). To edit an existing target, select the radio button next to the entry in the table and then click the Edit button. To delete targets, select the radio button next to the entry in the table and then click the Delete button.
Page 63
10 target IDs. (Maximum length: 32 characters) IP Address – Specifies the IP address of the receiving management station. UDP Port – The UDP port that is used on the receiving management station for notification messages.
Service Set Identification (SSID) and security settings. However, most radio signal parameters apply to all four VAP interfaces. The VAPs function similar to a VLAN, with each VAP mapped to its own VLAN ID. Traffic to specific VAPs can be segregated based on user groups or application traffic.
Page 65
Radio Interface Radio Settings A (802.11a) The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbps in Turbo mode. First configure the radio settings that apply to the individual VAPs (Virtual Access Point) and the common radio settings that apply to the overall system.
Page 66
WPA2 PMKSA Life Time – WPA2 provides fast roaming for authenticated clients by retaining keys and other security settings in a cache for each VAP. In this way, when clients roam back into a VAP they had previously been using, re-authentication is not required.
To configure Rouge AP detection, select the Radio Settings page, and scroll down to the “Rouge AP” section. Rogue AP – A “rogue AP” is either an access point that is not authorized to participate in the wireless network, or an access point that does not have the correct security configuration.
Page 68
• AP Scan Interval – Sets the time between each rogue AP scan. (Range: 30 -10080 minutes; Default: 720 minutes) • AP Scan Duration – Sets the length of time for each rogue AP scan. A long scan duration time will detect more access points in the area, but causes more disruption to client access.
Page 69
54 Mbps. Turbo Mode is an enhanced mode (not regulated in IEEE 802.11a) that provides a higher data rate of up to 108 Mbps. Enabling Turbo Mode allows the access point to provide connections up to 108 Mbps. (Default: Disabled) Note: In normal mode, the access point provides a channel bandwidth of 20 MHz, and supports the maximum number of channels permitted by local regulations (e.g.,...
Page 70
Maximum Supported Rate – The maximum data rate at which the access point transmits unicast packets on the wireless interface. The maximum transmission distance is affected by the data rate. The lower the data rate, the longer the transmission distance. (Options: 54, 48, 36, 24 Mbps; Default: 54 Mbps) Maximum Associated Clients –...
Page 71
Antenna ID is set to "Default Antenna" to use the access point's integrated antennas. • Right: The radio only uses the antenna on the right side (the side closest to the access point LEDs). Select this method when using an optional external antenna that is connected to the right antenna connector.
Page 72
CTS (clear to send) frame to notify the sending station that it can start sending data. If the RTS threshold is set to 0, the access point always sends RTS signals. If set to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.
Page 73
Access Categories — WMM defines four access categories (ACs): voice, video, best effort, and background. These categories correspond to traffic priority levels and are mapped to IEEE 802.1D priority tags (see Table 6-1). The direct mapping of the four ACs to 802.1D priorities is specifically intended to facilitate inter operability with other wired network QoS policies.
Page 74
• CW (Contention Window), a number used to calculate a random backoff time After a collision detection, a backoff wait time is calculated. The total wait time is the sum of a minimum wait time (Arbitration Inter-Frame Space, or AIFS) determined from the AIFSN, and a random backoff time calculated from a value selected from zero to the CW.
Page 75
For high-priority traffic, the AIFSN and CW values are smaller. The smaller values equate to less backoff and wait time, and therefore more transmit opportunities. To configure WMM, select the Radio Settings page, and scroll down to the WMM configuration settings.
Page 76
WMM allows the acknowledgement wait time to be turned off for each Access Category (AC). Although this increases data throughput, it can also result in a high number of errors when traffic levels are heavy. (Default: Acknowledge) WMM BSS Parameters –...
Page 77
System Configuration Radio Settings G (802.11g) The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because the IEEE 802.11g standard is an extension of the IEEE 802.11b standard, it allows clients with 802.11b wireless network cards to associate to an 802.11g access point.
Page 78
Radio Interface Most of the 802.11g commands are identical to those used by the 802.11a interface. For information on the these commands, refer to the following sections: • “Configuring VAP Radio Settings” on page 6-51 • “Configuring Rogue AP Detection” on page 6-53 •...
Page 79
For example, in the United States you can deploy up to three access points in the same area (e.g., channels 1, 6, 11). Also note that the channel for wireless clients is automatically set to the same as that used by the access point to which it is linked.
Page 80
The access point is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of “any” can read the SSID from the beacon and automatically set their SSID to allow immediate connection to the nearest access point.
Page 81
Windows • Clients may require hardware upgrade to be WPA2 compliant Note: You must enable data encryption through the web or CLI in order to enable all types of encryption (WEP, TKIP, or AES) in the access point. 6-70...
Page 82
The configuration for these security combinations are outlined in the following table. Note that MAC address authentication can be configured independently to work with all security mechanisms and is indicated separately in the table. Required RADIUS server support is also listed.
Page 83
Authentication: WPA Encryption: Enable WPA Configuration: Supported Cipher Suite: WEP 802.1x: Required Set 802.1x key refresh and reauthentication rates Static and dynamic Enter 1 to 4 WEP keys Local or Disabled Yes (802.1x) WEP keys Select a WEP transmit key and 802.1x WPA...
Page 84
After you have configured the radio settings, select Security under Radio A or Radio G, set an SSID to identify the wireless network service provided by each VAP you want to use, and then click Apply to save your settings.
Page 85
(WEP) on the access point to prevent unauthorized access to the network. If you choose to use WEP shared keys instead of an open system, be sure to define at least one static WEP key for user authentication and data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network.
Page 86
(Default: Key 1) Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported on all wireless clients. (Default: None) Note: Key index and type must match that configured on the clients.
Page 87
Encryption – Enable or disable the access point to use data encryption (WEP, TKIP, or AES). If this option is selected when using static WEP keys, you must configure at least one key on the access point and all clients. (Default: Disabled) Note: You must enable data encryption through the web or CLI in order to enable all types of encryption (WEP, TKIP, or AES) in the access point.
Page 88
Temporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys. Basically, TKIP starts with a master (temporal) key for each user session and then mathematically generates other keys to encrypt each data packet.
Page 89
• Key Caching: WPA2 provides fast roaming for authenticated clients by retaining keys and other security information in a cache, so that if a client roams away from an access point and then returns, re-authentication is not required. When a WPA2 client is first authenticated, it receives a Pairwise Master Key (PMK) that is used to generate other keys for unicast data encryption.
Page 90
The first time a client is authenticated to a wireless network it has to be fully authenticated. When the client is about to roam to another access point in the network, the access point sends pre-authentication messages to the new access point that include the client’s security association information.
Page 91
802.1X authentication. (Default: Disabled) Authentication Setup – To use WPA or WPA2, set the access point to one of the following options. If a WPA/WPA2 mode that operates over 802.1X is selected (WPA, WPA2, or WPA-WPA2-mixed), the 802.1X settings and RADIUS server...
Page 92
(requires RADIUS server to be specified) 1: You must enable data encryption in order to enable all types of encryption in the access point. 2: Select TKIP when any WPA clients do not support AES. Select AES only if all clients support AES. 6-83...
Page 93
System Configuration Configuring 802.1X IEEE 802.1X is a standard framework for network access control that uses a central RADIUS server for user authentication. This control feature prevents unauthorized access to the network by requiring an 802.1X client application to submit user credentials for authentication.
Page 94
Only those clients successfully authenticated with 802.1X are allowed to access the network. Note: If 802.1X is enabled on the access point, then RADIUS setup must be completed (see “RADIUS” on page 6-7). When 802.1X is enabled, the broadcast and session key rotation intervals can also be configured.
Shows the wireless clients currently associated with the access 6-89 point Event Logs Shows log messages stored in memory 6-91 Access Point Status The AP Status window displays basic system configuration settings, as well as the settings for the wireless interface. 6-86...
Page 96
• System Contact: Administrator responsible for the system. • IP Address: IP address of the management interface for this device. • IP Default Gateway: IP address of the gateway router between this device and management stations that exist on other network segments.
Page 97
• Hardware Version: Shows the hardware version number. AP Wireless Configuration – The AP Wireless Configuration tables display the radio and VAP interface settings listed below. Note that Interface Wireless A refers to the 802.11a radio and Interface Wireless G refers the 802.11b/g radio.
Once authentication is completed, stations can associate with the current access point, or reassociate with a new access point. The association procedure allows the wireless system to track the location of each mobile client, and ensure that frames destined for each client are forwarded to the appropriate access point.
• WEP keys do not match: When the access point uses “Shared Key Authentication,” but the key used by client and access point are not the same, the frame will be decrypted incorrectly, using the wrong algorithm and sequence number.
• Priority: The priority designated to the specified port. • Path Cost: Displays the path cost value for the specified port. • Status: Displays if STP is enabled or disabled for the specified port. • State: Display the STP state for the specified port.
Page 101
Command Line Interface country This command configures the access point’s country code, which identifies the country of operation and sets the authorized radio channels. Syntax country <country_code> country_code - A two character code that identifies the country of operation. See the following table for a full list of codes.
Page 102
System Management Commands Table 7-5. Country Codes Country Code Country Code Country Code Country Code Bahrain Germany Malaysia Switzerland Belarus Greece Malta Syria Belgium Guatemala Mexico Taiwan Honduras Monaco Thailand Belize Hong Kong Morocco Trinidad & Tobago Bolivia Hungary Netherlands...
Page 103
Check the following items before you contact local Technical Support. If wireless clients cannot access the network, check the following: • Be sure the access point and the wireless clients are configured with the same Service Set ID (SSID). • If authentication or encryption are enabled, ensure that the wireless clients are properly configured with the appropriate authentication or encryption keys.
Page 104
If you forgot or lost the password: • Set the access point to its default configuration by pressing the reset button on the back panel for 5 seconds or more. Then use the default user name “admin” to access the management interface.
Page 105
100 meters (328 feet). The RJ-45 port on the access point is wired with MDI pinouts. This means that you must use crossover cables for connections to PCs or servers, and straight-through cable for connections to switches or hubs.
Page 106
Straight-Through Wiring Because the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “straight-through” cable for network connections to hubs or switches that only have MDI-X ports. However, if the device to which you are connecting supports auto-MDIX operation, you can use either “straight-through”...
Because the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “crossover” cable for network connections to PCs, servers or other end nodes that only have MDI ports. However, if the device to which you are connecting supports auto-MDIX operation, you can use either “straight-through” or “crossover”...
The operating range distances listed in the following tables are for typical environments only. Operating ranges can vary considerably depending on factors such as local interference and barrier composition. It is recommended to do a site survey to determine the maximum ranges for specific access point locations in your environment.
Glossary 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable. 100BASE-TX IEEE 802.3u specification for 100 Mbps Fast Ethernet over two pairs of Category 5 or better UTP cable. Access Point An internetworking device that seamlessly connects wired and wireless networks.
Page 115
Glossary Broadcast Key Broadcast keys are sent to stations using 802.1X dynamic keying. Dynamic broadcast key rotation is often used to allow the access point to generate a random group key and periodically update all key-management capable wireless clients. CSMA/CA Carrier Sense Multiple Access with Collision Avoidance.
Page 116
A wireless standard that supports wireless communications in the 2.4 GHz band using using Orthogonal Frequency Division Multiplexing (OFDM). The standard provides for data rates of 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps. IEEE 802.11g is also backward compatible with IEEE 802.11b.
RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. Service Set Identifier (SSID) An identifier that is attached to packets sent over the wireless LAN and functions as a password for joining a particular radio cell; i.e., Basic Service Set (BSS).
Page 118
Wireless devices without a valid WEP key will be excluded from network traffic. WPA Pre-shared Key (PSK) PSK can be used for small office networks that may not have the resources to configure and maintain a RADIUS server, WPA provides a simple operating mode that uses just a pre-shared password for network access.
B-3 cipher suite 6-82, 7-121 CSMA/CA 1-1 closed system 7-109 CTS 6-59, 7-107 configuring 6-12 MAC address 6-13, 7-71, 7-72 type 6-69, 7-109 data rate web redirect 6-14, 7-20 maximum distances C-6 data rate, options C-1 default settings 1-6...
Page 121
6-86, 7-24 reset 6-32, 7-10 displaying station status 6-89, 7-114 reset button 1-5, 6-32 straight-through cable B-2 resetting the access point 6-32, 7-10 system clock, setting 6-36, 7-36 restarting the system 6-32, 7-10 system log RJ-45 port...
Page 122
Index Wi-Fi Multimedia See WMM Wi-Fi Protected Access See WPA VLAN Wired Equivalent Protection See WEP configuration 6-52, 7-134 WPA 6-79 native ID 6-52 pre-shared key 6-82, 7-127 WPA, pre-shared key See PSK WEP 6-74 configuring 6-74 shared key 6-75, 7-123...
Need help?
Do you have a question about the AWAP02O-86 and is the answer not in the manual?
Questions and answers