
Access Point Features
AP-8000 User Guide
38
•
Guard Interval:
Guard Interval ensures that distinct transmissions do not interfere with one another. This feature
provides immunity to users. Each user is allotted a time slot to transmit their data and this time slot ends with the
guard interval.
•
Tx Antennas:
This parameter enables the transmission antennas. This is configured as bit-mask. E.g.: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
•
Rx Antennas:
This parameter enables the receiving antennas. This is configured as bit-mask. E.g.: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
The bottom enclosure of the device will display R and A with specific numbers, where R stands for Radio and A stands for
Antenna.
Ethernet
The Ethernet feature provide the feasibility to view MAC address of the Ethernet Interface, speed and the mode of
transmission.
Ethernet Features
•
MAC Address:
This parameter represents the MAC address of the Ethernet interface.
•
Speed:
This parameter displays the speed of the Ethernet interface.
•
Transmit:
This parameter displays the transmit mode of the Ethernet interface.
•
TxMode And Speed:
This Parameter represents the Transmit Mode and Speed of the Ethernet interface.
Security
AP supports the following security features.
Wired Equivalent Privacy (WEP) Encryptions
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy (WEP), that is
designed to provide a wireless LAN with a security level equal to what is found on a Wired Ethernet Network. WEP
encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a
WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be
configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device
is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a Ethernet
port. A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a
wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol
(EAP) as a standards-based authentication framework, and supports automatic key distribution for enhanced security.
The EAP-based authentication framework can easily be upgraded to keep pace with future EAP types.
Decimal
Binary
Active Antennas
Marking of the Enclosure
1
001
First Antenna
A1
2
010
Second Antenna
A2
3
011
First and Second Antenna
A1 and A2
4
100
Third Antenna
A3
5
101
Third and First Antenna
A3 and A1
6
110
Third and Second Antenna
A3 and A2
7
111
First, Second and Third Antenna
A1, A2,a nd A3