CHAPTER 1
INTRODUCTION
Revised: 19 Jan 16
1-3
EST P/N AA107-Horizon
3.
Access Point Masquerade Mode
The Access Point Masquerade mode is a special use of the Access Point mode where the Horizon will connect mobile
clients into a single static IP address on a wired network. Data requests from the wireless network will be processed
through the Access Point Masquerade modem, but any request from the wired Ethernet network to devices on the wireless
network will be rejected similar to the operation of a “firewall”. The Horizon will hide all the IP addresses connected on
the wireless link. You would use this mode of operation if Horizon is connected directly to the Internet with a static IP
address (DSL, T1, etc.) and you want the wireless clients to access the information through the Horizon (Figure 4). This
mode should also be used for attaching the Horizon to a network where few IP addresses are available or a firewall for the
wireless clients is required.
Access Point Repeater
The Access Point Repeater is a unique enhancement of the ESTeem Horizon series. The Access Point Repeater can be
used with any of the above Access Point modes. With this repeater feature enabled, the Access Points do not have to be
hardwired together on the same physical LAN to provide seamless Ethernet communication for roaming clients. In addition
to greatly extending the Access Point canopy range, the Horizon will also bridge any Ethernet device or Ethernet network
connected to the unit over this same wireless Ethernet network. This mode gives the user the features of a point to multi-
point bridge network but also allows the Horizon in the Client mode to simultaneously roam under the network canopy.
Self-Healing Mesh Network
If multiple Access Point Repeater routes are configured to the same destination ESTeem, the Horizon will create a “self-
healing” mesh network by automatically re-routing data through alternate paths to reach its destination if the primary
path is inoperable. The routing and priority of alternate paths is completely user configurable. (See Figure 5)
Figure 5: Mesh Network Diagram