background image

BUSINESS SERIES

Model:

 WAP4410N

Wireless-N Access Point 

with Power Over Ethernet

User Guide

Summary of Contents for WAP4410N

Page 1: ...BUSINESS SERIES Model WAP4410N Wireless N Access Point with Power Over Ethernet User Guide ...

Page 2: ...istered trademark or trademark of Cisco Systems Inc and or its affiliates in the U S and certain other countries Copyright 2008 Cisco Systems Inc All rights reserved Other brands and product names are trademarks or registered trademarks of their respective holders ...

Page 3: ...e Wireless G Exterior Access Point 6 The LEDs 6 The Ports 7 Antennas and Positions 7 Chapter 5 Connecting the Wireless N Access Point 9 Overview 9 Connection 9 Placement Options 9 Stand Option 10 Wall Mount Option 11 Chapter 6 Setting Up the Wireless N Access Point 12 Overview 12 Accessing the Utility 12 Navigating the Utility 13 Setup 13 Wireless 13 AP Mode 13 Administration 14 Status 14 Chapter ...

Page 4: ... Tab 34 Log 34 The Administration Diagnostic Tab 35 Ping Test 35 The Administration Factory Default Tab 35 Factory Default 35 The Administration Firmware Upgrade Tab 35 Firmware Upgrade 35 The Administration Reboot Tab 37 Reboot 37 The Administration Config Management Tab 38 Config Management 38 The Status Local Network Tab 39 Information 39 Local Network 39 The Status Wireless Tab 40 Wireless Net...

Page 5: ... 59 FCC Statement 59 FCC Caution 59 FCC Radiation Exposure Statement 59 Generic Discussion on RF Exposure 59 Explosive Environment Medical and FAA Device Information 61 Safety Notices 61 Industry Canada Canada 61 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 62 Appendix H Software License Agreement 70 Software in Linksys P...

Page 6: ...The Courier font is used to indicate characters that you should type into a field exactly as printed in this guide Example In the Mailbox Subscribe Expires field type 30 In this example you would type the number 30 in the field Parameters Angle brackets and italic type indicate parameters that you must replace with the appropriate data Example Type 800 IP address of device 5090 In this example you...

Page 7: ... only 3 Press Enter Acrobat jumps to the first instance of the search term Pressing Enter again continues to more instances of the term Finding Text in Multiple PDFs The Search window lets you search for terms in multiple PDFs The PDFs do not need to be open Either Choose Edit Search or Click the arrow next to the Find box and choose Open Full Acrobat Search The Search window appears In the Search...

Page 8: ... to transmit and receive data streams in different directions Users are encouraged to update their firmware through www linksys com when 802 11n specification is finalized by IEEE to ensure compatibility with all the wireless N devices Networks are useful tools for sharing computer resources You can access one printer from different computers and access data located on another computer s hard driv...

Page 9: ...g Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both share the same wireless network SSID and wireless security settings Before you consider roaming choose a feasible radio channel and optimum access point position Proper acc...

Page 10: ... setup The wireless Access Points are connecting to a Linksys switch that provides power to the Access Points Each Access Point can connect multiple wireless devices to the network This network will provide connectivity among wireless network devices and PCs that have a wired connection to the switch The switch then can connect to a router that can connect to an ISP to reach global Internet ...

Page 11: ...n the Access Point is powered on PoE Green Lights up when the Access Point is powered through Ethernet cable WIRELESS Green Lights up when the Access Point is successfully connected to a wireless device If the Wireless LED is flashing the Access Point is actively sending to or receiving data from a wireless device ETHERNET Green Lights up when the Access Point is successfully connected to a device...

Page 12: ...router that may or may not support Power over Ethernet PoE Reset Button There are two ways to reset the Access Point to the factory default configuration Either press the Reset button for approximately ten seconds or restore the defaults using the Access Point s Web based Utility Antennas and Positions The Access Point s port are located on the back of the device The Access Point can be placed in ...

Page 13: ... G Exterior Access Point Antenna The Access Point has three detachable 2dBi omni directional antennas The three antennas have a base that can rotate 90 degrees when in the standing position The three antennas will all be used to support 2X3 MIMO diversity in wireless N mode ...

Page 14: ...re using Power Over Ethernet POE proceed to the following section Placement Options If you are not using POE then connect the included power adapter to the Access Point s Power port Then plug the power adapter into an electrical outlet The LEDs on the front panel will light up as soon as the Access Point powers on Placement Options There are three ways to place the Wireless N Access Point The firs...

Page 15: ...1 Locate the Access Point s left side panel 2 The Access Point includes two stands With the two large prongs facing outward insert the short prongs into the little slots in the Access Point and push the stand upward until it snaps into place 3 Repeat this step with the other stand Short Prongs ...

Page 16: ... cris cross wall mount slots 2 Determine where you want to mount the Access Point and install two screws that are 2 15 16 apart 3 Line up the Access Point so that the wall mount slots line up with the two screws 4 Place the wall mount slots over the screws and slide the Access Point down until the screws fit snugly into the wall mount slots ...

Page 17: ...SID under the Basic Wireless Settings Tab Select the level of security under the Wireless Security Tab and complete the options for the selected security mode Accessing the Utility There are three ways to connect to your Access Point for the first time If you have a 48VDC Power Injector e g Linksys WAPPOE power up your Access Point first then connect the Injector s cable to your PC Configure your ...

Page 18: ...y Setup Enter the Host Name IP Address settings and set the time on this screen Basic Setup Configure the host name and IP address settings for this Access Point Time Set the time on this Access Point Advanced Set the HTTP Redirect and 802 1x Supplicant settings for this Access Point Wireless You will use the Wireless tabs to enter a variety of wireless settings for the Access Point Basic Wireless...

Page 19: ...s Point s firmware on this screen Reboot Use this screen to reboot the Access Point Config Management You can save the configuration file for the Access Point to your PC as well as restore the backup configuration file to the Access Point Status You will be able to view status information for your local network wireless networks and network performance Local Network This screen displays system inf...

Page 20: ... for the benefit of identifying your Access Point after you log in Host Name This is the host name assigned to the Access Point This host name will be published to your DNS server if the Access Point is configured to acquire the IP address through DHCP In that case Linksys recommends to follow the company policy on the host name assignment The default name is Linksys Device Name You may assign any...

Page 21: ...ult is Disabled Select Static IP Address default if you want to assign a static or fixed IP address to the Access Point Then complete the following Local IP Address The IP address must be unique to your network Prefix Length Enter the Prefix length to match the IP address above Default Gateway Enter the IP Address of your Gateway or Router Enter the value used by other devices on your LAN Select A...

Page 22: ...ly The default is to set the time manually Automatically Select this option and time zone The Access Point will contact the public time server to get the current time If your location is currently using Daylight Saving enable the Automatically adjust clock for Daylight Saving changes checkbox User Defined NTP Server Enable this option if you have set up local NTP server Default is Disabled NTP Ser...

Page 23: ...nt Enable 802 1x Supplicant on Ethernet Network Enable this if your network requires this AP to use 802 1x authentication in order to operate Authentication via MAC Address Select this if you want to Use MAC Address for Authentication Authentication via Name and Password Select this if you want to use name and password for Authentication Enter the Name and Password in the following fields Change t...

Page 24: ... 300Mbps B G Mixed Both Wireless B and Wireless G client devices can be connected at their respective data rates Wireless N devices can be connected at Wireless G data rates B G N Mixed All the wireless client devices can be connected at their respective data rates in this mixed mode Wireless Channel Select the appropriate channel to be used among your Access Point and your client devices The defa...

Page 25: ...ur changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the screen and click More for additional details The Wireless Wireless Security Tab Change the Access Point s wireless security settings on this screen Wireless Security Select SSID Select the desired SSID from the drop down list Wireless Isolation between SSID When enabled wireless cl...

Page 26: ...is very useful when setting up a wireless hotspot location The default is Disabled The following section describes the detailed options for each Security Mode Disabled There is no option to be configured for this mode WPA Personal aka WPA PSK WPA Algorithms WPA offers you two encryption methods TKIP and AES for data encryption Select the type of algorithm you want to use TKIP or AES The default is...

Page 27: ... devices that use either WPA Personal or WPA2 Personal The Access Point will automatically choose the encryption algorithm used by each client device WPA Algorithms Mixed Mode automatically chooses TKIP or AES for data encryption Pre Shared Key Enter a WPA Shared Key of 8 63 characters Key Renewal Enter a Key Renewal Timeout period which instructs the Access Point how often it should change the en...

Page 28: ... or AES The default is TKIP Key Renewal Timeout Enter a Key Renewal Timeout period which instructs the Access Point how often it should change the encryption keys The default is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server for client authentication This should only be used when a RADIUS server is connected to the Access Point Primary Backup RADIU...

Page 29: ...ADIUS Server Enter the RADIUS server s IP address The Backup Radius Server will be used only if the primary Radius Server is unavailable Primary Backup RADIUS Server Port Enter the port number used by the RADIUS server The default is 1812 The Backup Radius Server will be used only if the primary Radius Server is unavailable Primary Backup Shared Secret Enter the Shared Secret key used by the Acces...

Page 30: ... RADIUS server The default is 1812 The Backup Radius Server will be used only if the primary Radius Server is unavailable Primary Backup Shared Secret Enter the Shared Secret key used by the Access Point and RADIUS server The Backup Radius Server will be used only if the primary Radius Server is unavailable WEP This security mode is defined in the original IEEE 802 11 This mode is not recommended ...

Page 31: ...as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the screen and click More for additional details The Wireless Connection Control Tab This screen allows you to configure the Wireless Connection Control to associating with the Access Point Connection Control Select SSID Select the d...

Page 32: ...ant to control Radius Primary Backup RADIUS Server Enter the RADIUS server s IP address The Backup Radius Server will be used only if the primary Radius Server is unavailable Primary Backup RADIUS Server Port Enter the port number used by the RADIUS server The default is 1812 The Backup Radius Server will be used only if the primary Radius Server is unavailable Primary Backup Shared Secret Enter t...

Page 33: ...ck the button on the right Option 2 The user has to give the PIN number which is founded in the utility of the client device Enter the number and click Register button Option 3 Enter the PIN number shown on the label at the bottom of the Access Point into the utility of client device Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to ca...

Page 34: ...ement VLAN Tag over WDS Select Disabled or Enabled as required QoS VLAN ID Enter the desired value for the VLAN Priority Select the desired priority from the list WMM Wi Fi Multimedia is a QoS feature defined by WiFi Alliance before IEEE 802 11e was finalized Now it is part of IEEE 802 11e When it is enabled it provides four priority queues for different types of traffic It automatically maps the ...

Page 35: ...el is used When it is set to 40MHz Wireless N connections will use 40MHz channel but Wireless B and Wireless G will still use 20MHz channel The default is 20MHz Guard Interval You can select the guard interval manually for Wireless N connections The three options are Auto Short 400ns and Long 800ns The default is Auto CTS Protection Mode CTS Clear To Send Protection Mode function boosts the Access...

Page 36: ... to get optimal resource utilization throughput or response time Utilization Threshold Enter the desired utilization value for the SSID Current Utilization This displays the current value of the utilization Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the ...

Page 37: ...isabled is considered to be a Rogue AP Not in Legal AP List If checked then any AP not listed in the Legal AP List is considered to be a Rogue AP If checked you must maintain the Legal AP List Define Legal AP Click this button to open a sub screen where you can modify the Legal AP List This list must contain all known APs so must be kept up to date Change these settings as described here and click...

Page 38: ... of the contact person such as a network administrator for the Access Point Device Name Enter the name you wish to give to the Access Point Location Enter the location of the Access Point Get Community Enter the password that allows read only access to the Access Point s SNMP information The default is public Set Community Enter the password that allows read write access to the Access Point s SNMP...

Page 39: ...otocol used to capture information about network activity The Access Point supports this protocol and sends its activity logs to an external server To enable Syslog select Enabled The default is Disabled Syslog Server IP Address Enter the IP address of the Syslog server In addition to the standard event log the Access Point can send a detailed log to an external Syslog server The Access Point s Sy...

Page 40: ...ght hand side of the screen The Administration Factory Default Tab On this screen you can restore the Access Point s factory default settings Factory Default Note any custom settings before you restore the factory defaults Once the Access Point is reset you will have to re enter all of your configuration settings Restore Factory Defaults To restore the Access Point s factory default settings click...

Page 41: ...s website www linksys com 2 Extract the firmware upgrade file on your computer 3 On the Firmware Upgrade screen enter the location of the firmware upgrade file in the field provided or click the Browse button to find the file 4 Click the Update button and follow the on screen instructions Help information is displayed on the right hand side of the screen ...

Page 42: ...e Access Point Reboot This feature is useful when you need to remotely reboot the Access Point Device Reboot To reboot the Access Point click the Yes radio button Click Save Settings to apply your change and the Access Point will reboot itself or click Cancel Changes to cancel your change Help information is displayed on the right hand side of the screen ...

Page 43: ... upload or download configuration files for the Access Point Save Configuration To save a backup configuration file on a computer click the Save Configuration to File button and follow the on screen instructions Restore Configuration To upload a configuration file to the Access Point enter the location of the configuration file in the field provided or click the Browse button to find the file Then...

Page 44: ...ion This is the version of the Access Point s current software Local MAC Address The MAC address of the Access Point s Local Area Network LAN interface is displayed here System Up Time This is the length of time the Access Point has been running Local Network IP Address This shows the Access Point s IP Address as it appears on your local network Subnet Mask This shows the Access Point s Subnet Mas...

Page 45: ...s shown here SSID 1 4 MAC Address The MAC Address of the Access Point s wireless interface is displayed here SSID 1 4 The Access Point s SSID is displayed here VLAN Trunk The Access Point s VLAN Trunk status is displayed here Priority Setting The current priority setting is displayed here SSID 1 4 Security Mode The security mode of the SSID is displayed here SSID 1 4 Priority The priority status o...

Page 46: ...ess of the Access Point s wired interface Connection This shows the status of the Access Point s connection for the wired network Packets Received This shows the number of packets received Packets Sent This shows the number of packets sent Bytes Received This shows the number of bytes received Bytes Sent This shows the number of bytes sent Error Packets Received This shows the number of error pack...

Page 47: ...ts Sent This shows the number of packets sent for each wireless network Bytes Received This shows the number of bytes received for each wireless network Bytes Sent This shows the number of bytes sent for each wireless network Error Packets Received This shows the number of error packets received for each wireless network Drop Received Packets This shows the number of packets being dropped after th...

Page 48: ... However a Centrio client only supports 20 MHz channels so the maximum throughput with this client will be 130 Mbps A WPC300N is recommended instead What is the IEEE 802 11b standard It is one of the IEEE standards for wireless networks The 802 11b standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11b standard ...

Page 49: ... CSMA CA plus Acknowledge protocol OFDM protocol Multi Channel Roaming Automatic Rate Selection RTS CTS feature Fragmentation Power Management What IPv6 features are supported The device supports the following IPv6 functions Path MTU discovery RFC1981 Internet Protocol v6 IPv6 RFC2460 IPv6 Neighbor Discovery ND RFC2461 IPv6 Stateless Address autoconfiguration RFC2462 ICMPv6 Internet Control Messag...

Page 50: ...r example must always acknowledge receipt of each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links Access Points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such...

Page 51: ... chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receive...

Page 52: ...ty Click the Wireless tab and then the Advanced Wireless tab Make sure the Output Power is set to 100 Does the Access Point function as a firewall No The Access Point is only a bridge from wired Ethernet to wireless clients I have excellent signal strength but I cannot see my network Wireless security such as WEP or WPA is probably enabled on the Access Point but not on your wireless adapter or vi...

Page 53: ...l PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resources Network N...

Page 54: ... Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps you can take Change the administrator s password regularly With every wirele...

Page 55: ...re all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized Use the highest level of encryption possible Use Shared Key authentication Change your WEP key regularly WPA WPA2 Personal Wi Fi Protected Access WPA This method offers two encryption methods TKIP ...

Page 56: ... from the Linksys website www linksys com 2 Extract the firmware upgrade file on your computer 3 Open the Access Point s Web based Utility 4 Click the Administration tab 5 Click the Upgrade Firmware tab 6 On the Firmware Upgrade screen enter the location of the firmware upgrade file in the field provided or click the Browse button to find the file 7 Click the Upgrade button and follow the on scree...

Page 57: ...formation on the World Wide Web Byte A unit of data that is eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy Chain A method used to connect devices in a series one after the other DDNS Dynamic Domain Name System Allows the hosting of a website FTP server or e mail server with a fixed domain name e g www xyz c...

Page 58: ... A device that interconnects networks with different incompatible communications protocols Half Duplex Data transmission that can occur in two directions over a single line but only one direction at a time HTTP HyperText Transport Protocol The communications protocol used to connect to servers on the World Wide Web Infrastructure A wireless network that is bridged to a wired network via an access ...

Page 59: ... addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunneled through an IP network This protocol is also used as a type of broadband connection in Europe RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connect...

Page 60: ...emporal Key Integrity Protocol a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted Topology The physical layout of a network TX Rate Transmission Rate Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network UPnP Universal Plug and Play is a series of protocols to allow devices to connect seamlessly ...

Page 61: ... available by phone or online US Canada Contacts 24 Hour Technical Support 866 606 1866 RMA Return Merchandise Authorization http www linksys com warranty Website http www linksys com FTP Site ftp ftp linksys com Support http www linksys com support Sales Information 800 546 5797 800 LINKSYS EU Contacts Website http www linksys com international Product Registration http www linksys com registrati...

Page 62: ...trical stress misuse negligence or accident f the serial number on the Product has been altered defaced or removed or g the product is supplied or licensed for beta evaluation testing or demonstration purposes for which Linksys does not charge a purchase price or license fee ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT WHETHER FACTORY LOADED ON THE PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING T...

Page 63: ...ur area can be found in the product User Guide and at www linksys com Have your product serial number and proof of purchase on hand when calling A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS If you are requested to return your product you will be given a Return Materials Authorization RMA number You are responsible for properly packaging and shipping your product to Lin...

Page 64: ...xperienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for ...

Page 65: ...on per RSS 102 Rev 2 The minimum separation distance from the antenna to general bystander is 7 9 inches 20cm to maintain compliance EU This system has been evaluated for RF exposure for Humans in reference to the ICNIRP International Commission on Non Ionizing Radiation Protection limits The evaluation was based on the EN 50385 Product Standard to Demonstrate Compliance of Radio Base stations and...

Page 66: ...ucts unless otherwise specified are not registered or listed as a FDA medical device Therefore specific use in some unique medical applications may require additional approvals Please contact your Cisco sales person for further details Safety Notices Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There ma...

Page 67: ...E This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol WARNING Risk of explosion if battery is replaced by an incorrect type Dispose of used batteries according to the instructions ...

Page 68: ...WAP4410N User Guide 63 Safety Notices ...

Page 69: ...WAP4410N User Guide 64 Safety Notices ...

Page 70: ...WAP4410N User Guide 65 Safety Notices ...

Page 71: ...WAP4410N User Guide 66 Safety Notices ...

Page 72: ...WAP4410N User Guide 67 Safety Notices ...

Page 73: ...WAP4410N User Guide 68 Safety Notices ...

Page 74: ...WAP4410N User Guide 69 Safety Notices For more information visit www linksys com ...

Page 75: ...CT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE LICENSE AGREEMENTS BELOW IF YOU DO NOT AGREE TO ALL OF THESE TERMS THEN YOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIE...

Page 76: ... you Upgrades ii to ensure that your Linksys product and or the Software is being used in accordance with the terms of this Agreement iii to provide improvements to the way Linksys delivers technology to you and to other Linksys customers iv to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and or Software and or v to enable L...

Page 77: ...cal data may be subject to U S export control laws and regulations and or export or import regulations in other countries You agree to comply strictly with all such laws and regulations U S Government Users The Software and documentation qualify as commercial items as defined at 48 C F R 2 101 and 48 C F R 12 212 All Government users acquire the Software and documentation with only those rights he...

Page 78: ...hts that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone u...

Page 79: ...to all third parties under the terms of this License c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redist...

Page 80: ...ponents compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not c...

Page 81: ...ded to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution ...

Page 82: ...AGES END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software The license terms below in this Schedule 3 are from the public web site at http www openssl org source license html ________________________________________ The ...

Page 83: ... BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF A...

Page 84: ...from the library being used are not cryptographic related 4 If you include any Windows specific code or a derivative thereof from the apps directory application code you must include an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WA...

Page 85: ...ash RAM LAN WLAN DHCP DHCP Client HTTP Redirect Redirects initial user access to an external Web Server to display company logo or network usage policy IPv6 Host Support for management and control of Access Point over IPv6 Supports RFC2460 IPv6 protocol and RFC4294 IPv6 Node Requirements Multiple BSSID Supports up to 4 BSSIDs allowing creating of multiple virtual Access Points VLANs Supports 802 1...

Page 86: ...x Wireless clients can be authenticated through IEEE 802 1x 802 1x Supplicant Supports 802 1x Supplicant on the Ethernet port to allow the AP to authenticate itself to the network Radius Server Up to 2 Radius Servers can be configured for redundancy purposes WPS Supports WPS WiFi Protected Setup which is a WIFI Alliance specification for simple and secure setup of a wireless network Rogue AP Detec...

Page 87: ...mit Power at Normal Temp Range for ETSI 11b g n 13 dBm 1TX 16 dBm 2TX 17 5dbm 3TX Antenna Gain in dBi 2 Receiver Sensitivity 11 n 300Mbps 69dBm 11 g 54Mbps 73dBm 11 b 11Mbps 88dBm Device Dimensions 6 69X6 69X1 60 inches 170X170X40 7mm 0 86 lbs 0 39 kg Power 12V 1A DC input and IEEE802 3af Compliant PoE Maximum power draw is 10 1 Watts Certification CC CE IC Operating Temperature 32ºF to 104ºF 0ºC ...

Reviews: