Ethernet; Security - Proxim ORiNOCO AP-8000 User Manual

Dual radio wireless access point
Hide thumbs Also See for ORiNOCO AP-8000:
Table of Contents

Advertisement

Access Point Features
Configuring the Device
11n AMSDU (Aggregated MAC Service Data Unit) Status: This parameter is used define the AMSDU status for
wireless 11n interface.
Frequency Extension: This parameter is used to configure the frequency extension for the wireless interface.
Guard Interval: Guard Interval ensures that distinct transmissions do not interfere with one another. This feature
provides immunity to users. Each user is allotted a time slot to transmit their data and this time slot ends with the
guard interval. This parameter is used to configure the guard interval for the wireless interface.
Tx Antennas: This parameter enables the transmission antennas. This is configured as bit-mask. E.g.: 3 - 011
(binary value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
Rx Antennas: This parameter enables the receiving antennas. This is configured as bit-mask. E.g.: 3 - 011
(binary value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
The bottom enclosure of the device will display R and A with specific numbers, where R stands for Radio and A stands
for Antenna.
Decimal
Binary
1
001
2
010
3
011
4
100
5
101
6
110
7
111

Ethernet

The Ethernet feature provide the feasibility to view MAC address of the Ethernet Interface, speed and the mode of
transmission.
Ethernet Features
MAC Address: This parameter represents the MAC address of the Ethernet interface.
Speed: This parameter is used to view the speed of the Ethernet interface.
Transmit: This parameter is used for configuring the transmit mode of the Ethernet interface.

Security

The AP supports the following security features:
WEP Encryptions
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy or WEP, that is
designed to provide a wireless LAN with a security level equal to what is found on a wired Ethernet network. WEP
encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a
WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be
configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device
is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a Ethernet
port. A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a
Active Antennas
First Antenna
Second Antenna
First and Second Antenna
Third Antenna
Third and First Antenna
Third and Second Antenna
First, Second and Third Antenna
Marking of the Enclosure
A1
A2
A1 and A2
A3
A3 and A1
A3 and A2
A1, A2,a nd A3
AP-8000 User Guide
36

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents