background image

Page 33 / 141

 

 

DTUS065 rev A.7 – June 27, 2014 

2.4GHz Overlapping radio channels 

The radio channel is only an indication of the central frequency in use. 
Modulation enlarges the channel to a 25 MHz band. This must be taken into 
account when several Wi-Fi cells are near to each other in 2.4GHz (5GHz 
channels do not overlap), otherwise the effective performance will decrease 
due to interferences. This point is especially important when you try to cover 
a geographic area with several access points. 
 

 

 
Although the use of “non-overlapping”  channels 1, 6, and 11 has limits 
when products are too close, the 1–6–11 guideline has merit.  If transmitter 
channels are chosen closer than channels 1, 6, and 11 (for example, 1, 4, 7, 
and 10), overlap between the channels may cause unacceptable degradation 
of signal quality and throughput. 
 

 

Example of geographical implantation of non-overlapping channels 

 

 

10 

 
 

 

 
 

 

 
 

13 

 
 

12 

 
 

 

 
 

 
 

11 

 
 

2412 
MHz 

2437 
MHz 

2462 
MHz 

2399,5 

MHz 

2484,5 

MHz 

25 MHz 

25 MHz 

25 MHz 

10 

11 

12 

13 

5 MHz 

Frequency 

Channel 

14 

Summary of Contents for ETHERNET TO Wi-Fi GATEWAYS

Page 1: ...DTUS065 rev A 7 June 27 2014 ETHERNET TO Wi Fi GATEWAYS USER S GUIDE FOR 802 11A B G H N DEVICES...

Page 2: ...operation or use of the equipment ACKSYS reserves the right to revise this document periodically or change its contents without notice REGULATORY INFORMATION AND DISCLAIMERS Installation and use of t...

Page 3: ...for 2 4 GHz band 16 III 6 2 FCC rules for 5 GHz band 17 IV ADMINISTRATION OVERVIEW 18 IV 1 WEB INTERFACE 18 IV 2 RESET PUSHBUTTON 18 IV 3 ACKSYS NDM 18 IV 4 EMERGENCY UPGRADE 18 IV 5 SNMP AGENT 18 V T...

Page 4: ...signature 56 V 9 3 Not using the C Key 57 V 9 4 Replacing a product on the field 57 V 9 5 Working with the C Key in the lab 57 V 9 6 Programming a set of identical C Keys 58 V 10 SPANNING TREE PROTOC...

Page 5: ...STIONS 137 X 1 HOW IS THE WI FI BIT RATE CHOSEN 137 X 2 HOW MANY CLIENTS ARE HANDLED BY THE ACCESS POINT FUNCTION 137 X 3 WHAT IS THE DIFFERENCE BETWEEN WMM WME IEEE802 11E 137 X 4 MY CISCO ACCESS POI...

Page 6: ...s reference guide describes the version 2 4 3 of the product firmware If your product contains an earlier version you can download a firmware update from our Internet web site If your product contains...

Page 7: ...s or distributors will assume no liability for any damage or violation of government regulations arising from failing to comply with these guidelines Information in this document is subject to change...

Page 8: ...e HTTP and HTTPS Web browser configuration Acksys NDM compatibility SNMP agent for status and configuration Browser based firmware upgrades Emergency upgrade mode Wi Fi capabilities Modes Access point...

Page 9: ...e characteristics are covered in the quick installation guide of each product Feature WLn ABOARD WLn LINK OEM WLn xROAD WLn RAILBOX Wi Fi radios 2 1 1 1 2 802 11 spatial streams 2 2 3 3 Cellular radio...

Page 10: ...dictable behavior III 2Antenna types The following sections describe the most commonly used antenna type and the way to install them These explanations rely on good understanding of what a radiation p...

Page 11: ...pattern below This allows wall mounting without wasting radiations in the wall The gain is generally comprised between 7dBi and 9dBi Antenna Radiation pattern III 2 3 Yagi antenna This kind of antenna...

Page 12: ...about the Radiation pattern and internal layout III 3Antenna installation They are two major cases when considering antenna installation III 3 1 Non 802 11n case You can establish Wi Fi links from a f...

Page 13: ...n line of sight the other product is nowhere to be seen clearly III 3 2 802 11n With this norm considerations about EIRP and RSSI are still relevant But the 802 11n takes advantage of MIMO Multiple In...

Page 14: ...ormances compared to an indoor one because there are potentially no bounces at all This problem can be solved by sending polarized radio waves orthogonal to each other Such so called Slant Antennas ar...

Page 15: ...ry domain gives the rules to use each RF band To abide by your local laws you must select the country where the product will be installed before activating the Wi Fi card III 6Antenna gain and RF outp...

Page 16: ...6 36 4 27 500 9 24 250 12 21 125 15 18 62 5 18 15 32 21 12 16 24 In other words if you make use of antennas with a gain higher than 6dBi for every 1 dBi gain over 6 dBi the MAX RF output power must b...

Page 17: ...tdoor 23 200 6 1 29 800 UNII 3 5 725 5 825 149 to 161 outdoor 29 800 6 1 35 3 2 W 1 If antennas higher than 6dBi gain are utilized a reduction of 1 dB of the MAX RF output POWER is required for every...

Page 18: ...is activated the DIAG LED will blink quickly This mode allows either to reload the firmware from Acksys NDM or to reset to factory settings see point 2 IV 3 Acksys NDM Acksys NDM can detect the WLn p...

Page 19: ...ms etc Each layer has its own purpose and addressing scheme The LAN layer address allows a device to send data to another device connected to the same LAN But there is not enough information in a LAN...

Page 20: ...than a computer equipped with several network connections and used specifically to route packets Here is the path followed by a data packet routed through 2 routers The source and destination IP addre...

Page 21: ...ware address or MAC address The first three bytes identify the hardware manufacturer e g Hex 00 09 90 for an ACKSYS product The last three bytes change in each product This address is assigned at the...

Page 22: ...ge has named Class A network the networks 1 x x x 8 to 127 x x x 8 Class B the networks 128 0 x x 16 to 191 255 x x 16 Class C the networks 192 0 0 x 24 to 223 255 255 x 24 A host part with all bits s...

Page 23: ...e treated as exceptions to this default route Network devices often use the DHCP protocol to get their IP address The DHCP server may provide the address of the local router at the same time V 1 3 3 Z...

Page 24: ...rivate to public IP datagrams to masquerade the source private IP address into its own unique public IP address It also changes the incoming from public to private IP datagrams replacing the destinati...

Page 25: ...access point to gain access to other Wi Fi devices or LAN devices Products A B C can communicate with each other Product B relays data between products A and C Product B relays data between the LAN a...

Page 26: ...communication between clients In this case product A will be able to communicate with product B and the local network but not with product C according to the figure below Product C will also be able t...

Page 27: ...astructure mode In addition all wireless adapters on the ad hoc network must use the same SSID and the same channel number An ad hoc network tends to feature a small group of devices in very close env...

Page 28: ...ucts currently implement station and portal functions Products equipped with two radio cards can be used as mesh access points Products A to H can communicate with each other Products A B D E G provid...

Page 29: ...h ID It takes the same form as the infrastructure SSID but is a separate parameter if you use the same string for an infrastructure SSID and a mesh ID they are considered as two distinct WLANs V 2 5 V...

Page 30: ...ces baby monitors and old cordless telephones V 3 2 802 11g This transmission standard works in the 2 4 GHz band like 802 11b but operates at a maximum raw data rate of 54 Mbit s or about 20 Mbit s me...

Page 31: ...reception only Hence an 802 11n radio specification must include three numbers number of transmitters number of receivers and number of spatial streams In order to automatically adapt to radio conditi...

Page 32: ...twork See appendix for further details about radio channels Depending on the location of the product indoor outside not all wireless channels are available Refer to local regulation which is constantl...

Page 33: ...mportant when you try to cover a geographic area with several access points Although the use of non overlapping channels 1 6 and 11 has limits when products are too close the 1 6 11 guideline has meri...

Page 34: ...between each station and its associated Access Point and you can use WEP or WPA WPA2 V 5 1 WEP encryption WEP is a method of encrypting data for wireless communication and is intended to provide the s...

Page 35: ...authentication However it is quite the reverse It is possible to derive the static WEP key by capturing the four handshake frames in Shared Key authentication Hence it is advisable to use Open System...

Page 36: ...WPA WPA2 PSK can still be used The authentication process is organized around several agents User also called supplicant or Wireless Node WN Wireless access point or authenticator Authentication serv...

Page 37: ...802 1x protocol Preauthentication must be enabled in the AP to allow the client to use it WLn clients always use preauthentication when the AP offers it Pre authentication makes the client store comm...

Page 38: ...y can be from 8 to 63 printable ASCII characters The same password must remain stored in all the mesh nodes V 6 Wired to wireless bridging in infrastructure mode V 6 1 The problem As outlined in secti...

Page 39: ...very clean solution but needs to manage the subnetwork Strictly spoken this is routing layer 3 networking not bridging layer 2 networking Masquerading Let the client change the wired devices MAC addr...

Page 40: ...d In this case the bridge itself initiates an ARP for the destination IP address mentioned in the frame triggering from the LAN device a response that will update the table so that the next frame can...

Page 41: ...hernet MAC addresses in the Wi fi frame adding both the AP and the client Wi Fi MAC addresses So the frame can reach its Wi Fi destination which removes the Wi Fi addresses and retrieves the original...

Page 42: ...urce MAC address on the wireless interface The cloned address is used for all wireless transactions association authentication and data exchange The original MAC address of the radio card is ignored T...

Page 43: ...educes data throughput for the client Configuration After activating the proactive roaming feature you must adjust the list of channels scanned by the WLn client You can select one or several channels...

Page 44: ...e the current bad AP either The required level boost configuration parameter specifies how much better you want the new AP to be in order to begin reassociation The effects of the various parameters a...

Page 45: ...ce periodically During each period the client will successively switch to configured scan channels send a broadcast probe request frame and wait for responses The probe request contains the SSID among...

Page 46: ...can threshold to zero disables this feature default When set the scan threshold is compared to the power received from the current AP When the power is greater than the threshold the scan process is i...

Page 47: ...candidate AP The candidate AP is the AP where you will roam if the roaming is requested Roaming won t occur before the Minimum roaming interval has elapsed since the last association In areas where se...

Page 48: ...s that the signal power levels of the previous beacons are used like this for the most recent beacon 3 16 18 75 of the signal value for the penultimate beacon 3 16 13 16 15 for the antepenultimate bea...

Page 49: ...hentication frames 4 Key exchange frames WPA WPA2 EAP with radius server 8 frames 4 Authentication frames Several radius authentication frames 4 key exchange frames The 4 Authentication frames are man...

Page 50: ...AP1 to process a pre authentication with AP2 During this step the radius server sends the PMK to AP2 and the Wi Fi client They both store the PMK in their local cache At the end of this step the Wi Fi...

Page 51: ...ly keys This full authentication process produces data that will be stored by the Wi Fi client for the next step Step 2 The Wi Fi client roams on AP2 and uses data stored in the previous step in its a...

Page 52: ...cific description for each item acksysProductID a code identifying the product network product administration core administration functions adminReset adminSave adminApply adminResetFactory c key mana...

Page 53: ...Fixed 1 bridge configRadiusTable List of radius servers User defined configDhcpTable List of DHCP pools served Fixed 1 pool Fixed user cannot insert or delete rows User defined user can insert or dele...

Page 54: ...less client assoc clientLinkAlarm 1 3 6 1 4 1 28097 11 6 Variables may be bound in the notification to provide detailed information about the event Available variables are listed in the MIB for each a...

Page 55: ...sk key set bridge type to L25NAT therefore not WDS CFGSET 192 168 1 253 configIfStaWds radio0w0 i disable save and apply without rebooting CFGSET 192 168 1 253 adminSave 0 i 1 CFGSET 192 168 1 253 adm...

Page 56: ...ry settings the internal signature is cleared before rebooting when the user copies the internal configuration to the C Key the internal signature is recomputed so that it is the same as the newly cre...

Page 57: ...ew it 5 Mount NP in its location reconnect the cables If NP has been used previously and you are unsure whether its configuration disables the C Key 6 Power up NP wait for the Diag LED to turn green 7...

Page 58: ...boot and configure the product as needed 3 In Tools Set config C Key management select Ignore C Key settings and save option 4 Save and power off 5 Install a C Key and turn power on Wait until the dia...

Page 59: ...of the available bandwidth resulting in a so called broadcast storm However loops may be useful to create backup routes when a link fails See Point to point redundancy with dual band section for an ex...

Page 60: ...pages there are two buttons or three buttons After changing parameters press Save to record in permanent memory the parameters changed in this page Press Save Apply to record the parameters and then a...

Page 61: ...one radio is used to scan multiple channels while the other connects to AP s and transfers data In this mode the scanning process does not disturb data transfers but the scanner radio is reserved for...

Page 62: ...he 802 11g n mode operates in the 2 4GHz band 802 11g and is compatible with 802 11g and 802 11n devices The 802 11a n mode operates in the 5GHz band 802 11a h and is compatible with 802 11a h and 802...

Page 63: ...his check box to use the full 5 GHz channels list but in this case you must verify by yourself that the radio channels are used in the respect of local laws a b g n Data Rates tab Automatic supported...

Page 64: ...he third antenna or both the second and third In order to take advantage of 802 11n multiple spatial streams you must use at least as many antennas as spatial streams The transmit power is distributed...

Page 65: ...performance on the Wi Fi or when you have hidden stations e g in an exchange between stations A and B a third station which is visible by A but not by B hence interfering with B when it sends to A On...

Page 66: ...ternally and set to AP role with the same SSID you can fall in this trap by simply activating both radios and changing one of them from AP role to client role The product quickly enters a high priorit...

Page 67: ...his option allows you to not broadcast the SSID on the network This means that your clients need to know the SSID beforehand since scanning will not reveal the SSID of the AP Mesh ID only in Mesh mode...

Page 68: ...would depend on the nearest ones to access the 802 1X server EAP security is not available in repeater mode WPA WPA2 PSK can still be used According to the choice you ve made some properties will app...

Page 69: ...tering a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so that you can enter a...

Page 70: ...o 63 printable ASCII characters or 64 hexadecimal digits 256 bits The green arrow icons on the right allow to display the key in clear text while you are typing it in Group rekey AP mode only interval...

Page 71: ...obility domain and NAS ids to take advantage of this feature For more information please refer to section Fast Transition Support 802 11r Key cache life time In any of the EAP modes this indicates how...

Page 72: ...HAPV2 Custom NOTE Certificates and keys must be provided in PEM format This format is defined by the OpenSSL project It is a text file recognizable by a starting line beginning with BEGIN and the bina...

Page 73: ...for rekeying the PTK unicast encryption keys in seconds Master rekey interval Time interval for rekeying the GMK master key used internally to generate the GTK in seconds Wireless Security tab SAE Mod...

Page 74: ...available methods are ARPNAT default value 4 addresses format WDS Wired device cloning PROFINET device cloning This feature requires LLDP forwarding Please read the section Network configuration for...

Page 75: ...cess must periodically leave the AP channel and thus stop transmitting in order to scan other channels To achieve the best throughput we recommend using only one channel Delay between two successive s...

Page 76: ...o the currently associated AP But it will still be used if there is no current nor better AP Advanced Roaming tab only in Client mode Excessive signal detection threshold When the perceived signal lev...

Page 77: ...e corresponding duration depends on the beacon interval set in the AP Maximum time off channel When scanning another channel the current AP is told to buffer incoming data until the client returns to...

Page 78: ...do not require it WARNING this must not be used alone as an effective security feature since MAC addresses are is easy to masquerade MAC List Enter the client MAC address to deny or allow Enter MAC ad...

Page 79: ...e path This value must be greater than twice the network diameter traversal time so that the timout covers both a request and its response crossing the largest possible path in the network Active path...

Page 80: ...o answer back with a HWMP PREP frame that establishes the reverse data path from the root to any node Proactive RANN the root station periodically sends out a broadcast HWMP RANN frame advertising its...

Page 81: ...7 June 27 2014 Frames filter tab Wireless interfaces included in a bridge type network interface can filter frames as they pass along Filter group Choose one of the filters prepared in routing firewa...

Page 82: ...Each group is given a different VLAN ID which is used to mark the data frames exchanged within the group Then only devices configured to use the VLAN tag can communicate with other devices inside the...

Page 83: ...for this interface optional VLAN ID Enter the id for virtual interface If you need to create several VLAN IDs on top of the same physical interface you can use the space character to separate the IDs...

Page 84: ...SSID Network name also called SSID Priority group The scan process will choose the AP with the SSID of highest priority If you have several APs advertising SSIDs of the same priority the product will...

Page 85: ...oose DHCP if you have a DHCP server in the network and you want to assign an IP address to the AP In this case you do not need to fill in the fields shown above except possibly DNS Server and Enable S...

Page 86: ...all interfaces in this network are linked with the software equivalent of an Ethernet switch Enable STP If checked the STP Spanning Tree Protocol will be activated on this bridge If you choose to not...

Page 87: ...stribute networks between them In each network zone you can Set the forwarding rules towards other zones Set the NAT filtering rules Set the firewall rules a Zones Overview Click the Add zone button t...

Page 88: ...Force connection tracking By default the firewall disables the connection tracking for a zone if the NAT is not enabled Disabling the connection tracking increases the routing performance Check this o...

Page 89: ...an specify either a single port or a port range using a dash between the starting and ending ports If this field is blank any port will match Private Port The NAT will replace the original destination...

Page 90: ...e Drop Drop packet without ICMP message Destination zone Zone where traffic will be forwarded VI 1 4 2 Static routes In this section you can add a static route in the device Target Destination host or...

Page 91: ...en wikipedia org wiki SYN_flood Drop invalid packets Drop invalid frames or frames without active connection VI 1 4 4 Bridge filter In this section you can manage layer 2 link level filter groups Each...

Page 92: ...e Multicast Check if the frame is multicast type Check MAC This field is visible only if Mac frame type is different of no filter Src Addr Check the frame type on source MAC address field Dest Addr Ch...

Page 93: ...or ARP Dest IP Check on the destination IP field in the frame For ARP protocol the Target IP address field was used Src IP Check on the source IP field in the frame For ARP protocol the Sender IP addr...

Page 94: ...frame Wildcards are not allowed SOURCE PORT The source port of the incoming frame This parameter is valid for TCP UDP protocols only see above You can specify either a single port or a port range usin...

Page 95: ...istbox allows you to select User or Default QoS parameters Default QoS parameters are given for reference and cannot be modified AP Parameters This table allows you to change the WMM parameters for th...

Page 96: ...the AP in its management frame CWMIN Defines the minimum contention window size expressed in number of time slots Allowed values are 0 to 12 CWMAX Defines the maximum contention window size expressed...

Page 97: ...r of leased addresses Lease time if DHCP enabled This represents the time during which a given IP address remain valid After that time the client needs to renew his lease Interface settings LAN Advanc...

Page 98: ...formation about DHCP options Static Lease This option allows to always give the same predefined IP address according to the client MAC address DNS relay These options enable DNS protection Attack VI 1...

Page 99: ...and give them mnemonic names Once trigger names have been created you can set their event source and their associated action The event source and the action may need extra parameters depending on the...

Page 100: ...cation when a client associates or dissociates with one access point Temperature limit The event is triggered when the temperature exceeds the trigger Actions The snmp action when triggered will send...

Page 101: ...to administrate your product A set of menu is provided and offers simplified the following possibilities VI 2 1 Firmware upgrade Firmware upgrade has its own section in this user manual Firmware Upgra...

Page 102: ...column Log Settings This frame allows you to set the product log parameters It is possible to send the LOG to an external log server syslog Local Time Settings This frame allows you to set the curren...

Page 103: ...t the use of domain name requires configuring one or more DNS server addresses in the Network configuration section VI 2 4 Network This panel provides two standard UNIX tools ping and traceroute Place...

Page 104: ...pt as a backup if the new configuration becomes damaged the backup will be loaded instead at boot time WARNING the WPA keys and the various certificates 802 1x HTTPS will be copied as well Anyone comi...

Page 105: ...DTUS065 rev A 7 June 27 2014 Reset And Reboot Reset to factory settings This option will restore the default product settings Reboot your device As its name suggests a click on this button will reboo...

Page 106: ...o This page displays some useful information about the device Providing the content of this page to the ACKSYS support team will speed up the technical support process VI 3 2 Network This page summari...

Page 107: ...ver its type data or management or modulation kind So it is not comparable to the values appearing in the site survey which concern only probe and beacon frames Also the signal level can vary a lot de...

Page 108: ...lude access points using the selected channels When the radio card is in access point mode the scan will disconnect associated clients When the radio card is in 802 11s mesh mode some peers seem to ap...

Page 109: ...this mesh path less is better Discovery Timeout Displays the current discovery timeout for this mesh path in milliseconds Discovery retries As its name implies displays the number of discovery retries...

Page 110: ...Services VI 3 4 1 DHCP Lease This panel summarizes the properties of all the current DHCP leases VI 3 5 LOG This panel allows to visualize the product logs You can see the Kernel logs logs from linux...

Page 111: ...is example we are using 802 11a with 20MHz HT mode channel 36 country code FR and ACKSYS as ESSID You can obviously change any of these parameters as long as your choice makes sense Product A Device C...

Page 112: ...long as your choice makes sense Product A Device Configuration Parameter Value Enable device on 802 11 mode 802 11na HT mode 40 MHz above Channel 36 Country code FR Interface Configuration 1 Public P...

Page 113: ...VLANs This mode adds a 802 1q tag in the frames sent to the LAN and uses the tag in incoming LAN frames to forward data to the associated SSID The tag itself is not transmitted over the Wi Fi link In...

Page 114: ...D 5 Interface LAN Network office Protocol DHCP Bridge interfaces Checked Interfaces LAN 3 and office Wi Fi adapter Network Production Protocol None Bridge interface Checked Interfaces LAN 5 and produc...

Page 115: ...one channel for SCADA Configuration summary In this example we have two different configurations one per radio card For Radio A Public side Mode 802 11na HT mode 40MHz above channel 36 country code FR...

Page 116: ...ce Configuration 2 Radio B Parameter Value Enable device on 802 11 mode 802 11na HT mode 40 MHz above Channel 44 Country code FR Interface Configuration 2 Radio B Parameter Value Role Access point ESS...

Page 117: ...ration Parameter Value Enable device on 802 11 mode 802 11na HT mode 40MHz above Channel 36 Country code FR Interface Configuration 1 Parameter Value Role Access point ESSID ACKSYS Product D Device Co...

Page 118: ...card You can obviously change any of these parameters as long as your choice makes sense For Radio A Mode 802 11ng HT mode 20MHz channel 11 country code FR ESSID ACKSYS1 For Radio B Mode 802 11na HT...

Page 119: ...eter Value Role Access point ESSID ACKSYS2 Product B Device Configuration Radio A Parameter Value Enable device on 802 11 mode same as product A HT mode same as product A Channel same as product A Cou...

Page 120: ...int and one bridge infrastructure in the same radio card In the example above Product B acts as a bridge with Product A and as an access point with product C Both products A and B have the same SSID i...

Page 121: ...lue Enable device on 802 11 mode same as product A HT mode same as product A Channel same as product A Country code any Interface Configuration 1 Radio A Parameter Value Role Repeater ESSID same as pr...

Page 122: ...ny of these parameters as long as your choice makes sense This topology shows that repeaters interconnection is not limited to a line Nevertheless the repeaters interconnections are limited to a tree...

Page 123: ...ace Configuration Parameter Value Role Repeater ESSID same as product A Next BSSID Product C radio card MAC address Product C Device Configuration Parameter Value Enable device on 802 11 mode 802 11na...

Page 124: ...device on 802 11 mode 802 11na HT mode 20MHz Channel 36 Country code FR Interface Configuration Parameter Value Role Access Point ESSID same as product A Product G Device Configuration Parameter Valu...

Page 125: ...ly change any of these parameters as long as your choice makes sense Mode Product B to Product C 802 11na HT mode 20MHz channel 44 country code FR ESSID ACKSYS1 You can obviously change any of these p...

Page 126: ...t WDS ESSID ACKSYS1 Device Configuration Radio B Parameter Value Enable device on 802 11 mode 802 11ng HT mode 40MHz above Channel 44 Country code FR Interface Configuration 1 Radio B Parameter Value...

Page 127: ...ntry code FR ESSID ACKSYS Mode Radio B for Products B C 802 11na HT mode 20MHz channel 40 country code FR ESSID ACKSYS2 Mode Radio B for Products D E 802 11na HT mode 20MHz channel 60 country code FR...

Page 128: ...er Value Enable device on 802 11 mode Same as product B Radio B HT mode Same as product B Radio B Channel Same as product B Radio B Country code any Interface Configuration Radio B Parameter Value Rol...

Page 129: ...iguration Radio B Parameter Value Role Access Point ESSID ACKSYS3 Product E Device Configuration Radio A Parameter Value Enable device on 802 11 mode Same as product A HT mode Same as product A Channe...

Page 130: ...ducts C F H 802 11na HT mode 20MHz channel 36 country code FR MESHID ACKSYS Mode Radio B for Products C 802 11na HT mode 20MHz channel 40 country code FR ESSID ACKSYS1 Mode Radio B for Products F 802...

Page 131: ...mode 20MHz Channel 40 Country code FR Interface Configuration Radio B Parameter Value Role Access Point ESSID ACKSYS1 Product F Device Configuration Radio A Parameter Value Enable device on 802 11 mod...

Page 132: ...HT mode 20MHz Channel 44 Country code FR Interface Configuration Radio B Parameter Value Role Access Point ESSID ACKSYS2 HT mode 20MHz Channel 48 Country code FR Interface Configuration Radio B Parame...

Page 133: ...choose a quiet desk instead of production line wait until the complete product reboot before trying to refresh the web page do not hesitate to contact the ACKSYS support team support acksys fr if you...

Page 134: ...de All All previous configuration changes will be left unchanged While the product is in Emergency upgrade mode it still allows to restore factory settings by pressing the reset button more than two s...

Page 135: ...f order If it is blinking quickly the device is in Emergency upgrade mode Check State LEDs The State LED is OFF when the corresponding radio is disabled it is blinking when the product tries to associ...

Page 136: ...ature which executes the ping command in background and then display the result on the web page A traceroute tool is also available on the same page Check security parameters Check security parameters...

Page 137: ...developers Documentation mac80211 RateControl minstrel X 2 How many clients are handled by the access point function There can be as many as 2000 clients per AP however performance drops when more th...

Page 138: ...s accordingly This figure is only an approximation and may vary under very heavy loads X 5 2 What is the roaming delay when the current access point disappears suddenly This can occur when a big obsta...

Page 139: ...ea Network a part of a network where devices can directly use MAC OSI layer 2 addresses to communicate with each other MCS Modulation and Coding Scheme the way the bits are encoded in radio waves in 8...

Page 140: ...el The mask requires that the signal be attenuated by at least 30 dB from its peak energy at 11 MHz from the center frequency so that the channels are effectively 22 MHz wide One consequence is that s...

Page 141: ...200 mW ETSI Europe ETSI US FCC 60 5 300 250 mW FCC 200 mW ETSI Europe ETSI US FCC 64 5 320 250 mW FCC 200 mW ETSI Europe ETSI US FCC 100 5 500 1 W Europe ETSI 104 5 520 1 W Europe ETSI 108 5 540 1 W...

Reviews: