Honeywell Thor VX9 User Manual page 107

Vehicle-mount computer
Hide thumbs Also See for Thor VX9:
Table of Contents

Advertisement

Parameter
Default
Aggressive Scan
On
CCX or CCX Features Optimized
WMM
On (Windows 7)
Off (all others)
Auth Server
Type 1
TTLS Inner Method
Auto-EAP
PMK Caching
Standard
WAPI
Off
TX Diversity
On
RX Diversity
On Start on
Main
Frag Thresh
2346
Function
When set to On and the current connection to an AP weakens, the radio ag-
gressively scans for available APs.
Aggressive scanning works with standard scanning (set through Roam
Trigger, Roam Delta and Roam Period). Aggressive scanning should be set
to On unless there is significant co-channel interference due to overlapping
APs on the same channel.
Options are: On, Off
Use of Cisco Compatible Extensions (CCX) radio management and AP
specified maximum transmit power features.
Options are:
Full - Use Cisco IE and CCX version number, support all CCX features. The
option known as "On" in previous versions.
Optimized –Use Cisco IE and CCX version number, support all CCX fea-
tures except AP assisted roaming, AP specified maximum transmit power
and radio management.
Off - Do not use Cisco IE and CCX version number.
Cisco IE = Cisco Information Element.
Use of Wi-Fi Multimedia extensions.
Devices running Windows XP can change the default value. Devices run-
ning all other OS cannot change the default value.
Specifies the type of authentication server.
Options are: Type 1 (ACS server) and Type 2 (non-ACS server)
Authentication method used within the secure tunnel created by EAP-
TTLS.
Options are:
AUTO-EAP (Any available EAP method), MSCHAPV2, MSCHAP, PAP,
CHAP, EAP-MSCHAPV2.
Type of Pairwise Master Key (PMK) caching to use when WPA2 is in use.
PMK caching is designed to speed up roaming between APs by allowing
the client and the AP to cache the results of 802.1X authentications, elimi-
nating the need to communicate with the ACS server. Standard PMK is
used when there are no controllers. The reauthentication information is
cached on the original AP. The client and the AP use the cached informa-
tion to perform the four-way handshake to exchange keys. Opportunistic
PMK (OPMK) is used when there are controllers. The reauthentication in-
formation cached on the controllers. The client and the controller behind the
AP use the cached information to perform the four-way handshake to ex-
change keys.
If the selected PMK caching method is not supported by the network infra-
structure, every roam requires full 802.11X authentication, including inter-
action with the ACS server.
If the active profile is using WPA2 CCKM, the global PMK Caching setting
is ignored and the client attempts to use CCKM.
Options are: Standard, OPMK
Default is Off and dimmed (cannot be changed).
How to handle antenna diversity when transmitting packets to the Access
Point.
Options are: Main only, and On.
How to handle antenna diversity when receiving packets from the Access
Point.
Option is: On-start on Main
Note: This parameter cannot be changed for some Summit radios.
If the packet size (in bytes) exceeds the specified number of bytes set in the
fragment threshold, the packet is fragmented (sent as several pieces in-
stead of as one block). Use a low setting in areas where communication is
poor or where there is a great deal of wireless interference.
Options are: Any number between 256 bytes and 2346 bytes.
5 - 45

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents