background image

Page 4 / 141

 

 

DTUS065 rev A.7 – June 27, 2014 

V.5.3

 

Pre-shared key mode (PSK)............................................................................................................ 36

 

V.5.4

 

Enterprise mode (802.1x, RADIUS)............................................................................................... 36

 

V.5.5

 

Protected management frame (802.11w) ........................................................................................ 37

 

V.5.6

 

Mesh Secure Authentication of Equals (SAE) ................................................................................ 38

 

V.6

 

WIRED TO WIRELESS BRIDGING IN INFRASTRUCTURE MODE .............................................. 38

 

V.6.1

 

The problem .................................................................................................................................... 38

 

V.6.2

 

Solutions ......................................................................................................................................... 39

 

V.7

 

FAST ROAMING FEATURES ............................................................................................................. 43

 

V.7.1

 

Mono-channel vs. multichannel roaming ....................................................................................... 43

 

V.7.2

 

Proactive roaming vs. reactive roaming ......................................................................................... 43

 

V.7.3

 

What happens when the current AP fails ........................................................................................ 44

 

V.7.4

 

Scanning ......................................................................................................................................... 45

 

V.7.5

 

Advanced Roaming settings ........................................................................................................... 47

 

V.7.6

 

Authentication speed up ................................................................................................................. 49

 

V.8

 

ACKSYS MIB AND SNMP AGENT .................................................................................................... 52

 

V.8.1

 

Access methods .............................................................................................................................. 52

 

V.8.2

 

Using the Acksys MIB ................................................................................................................... 52

 

V.8.3

 

Managing configuration tables ....................................................................................................... 53

 

V.8.4

 

Using SNMP notifications (traps) .................................................................................................. 54

 

V.8.5

 

Examples ........................................................................................................................................ 54

 

V.9

 

C-KEY HANDLING .............................................................................................................................. 56

 

V.9.1

 

Factory settings ............................................................................................................................... 56

 

V.9.2

 

Understanding configurations and their signature .......................................................................... 56

 

V.9.3

 

Not using the C-Key ....................................................................................................................... 57

 

V.9.4

 

Replacing a product on the field ..................................................................................................... 57

 

V.9.5

 

Working with the C-Key in the lab ................................................................................................. 57

 

V.9.6

 

Programming a set of identical C-Keys .......................................................................................... 58

 

V.10

 

SPANNING TREE PROTOCOL (STP)............................................................................................. 59

 

VI

 

WEB INTERFACE REFERENCE ......................................................................................................... 60

 

VI.1

 

SETUP MENU ....................................................................................................................................... 60

 

VI.1.1

 

Physical interfaces .......................................................................................................................... 60

 

VI.1.2

 

Virtual interfaces ............................................................................................................................ 82

 

VI.1.3

 

Network .......................................................................................................................................... 85

 

VI.1.4

 

Routing / Firewall ........................................................................................................................... 87

 

VI.1.5

 

QOS ................................................................................................................................................ 94

 

VI.1.6

 

Services........................................................................................................................................... 97

 

VI.2

 

TOOLS MENU .................................................................................................................................... 101

 

VI.2.1

 

Firmware upgrade ......................................................................................................................... 101

 

VI.2.2

 

Password Settings ......................................................................................................................... 101

 

VI.2.3

 

System .......................................................................................................................................... 102

 

VI.2.4

 

Network ........................................................................................................................................ 103

 

VI.2.5

 

Save Config / Reset ...................................................................................................................... 103

 

VI.3

 

STATUS MENU .................................................................................................................................. 106

 

VI.3.1

 

Device Info ................................................................................................................................... 106

 

VI.3.2

 

Network ........................................................................................................................................ 106

 

VI.3.3

 

Wireless ........................................................................................................................................ 107

 

VI.3.4

 

Services......................................................................................................................................... 110

 

VII

 

WIRELESS TOPOLOGIES EXAMPLES ........................................................................................... 111

 

VII.1

 

SIMPLE “WIRELESS CABLE” ...................................................................................................... 111

 

VII.2

 

MULTIPLE SSID ............................................................................................................................. 112

 

VII.3

 

MULTIPLE SSID WITH VLAN ..................................................................................................... 113

 

VII.4

 

MULTIPLE SEPARATE SSID ........................................................................................................ 115

 

VII.5

 

INFRASTRUCTURE  ROAMING ................................................................................ 117

 

VII.6

 

POINT-TO-POINT REDUNDANCY WITH DUAL BAND .......................................................... 118

 

VII.7

 

LINE TOPOLOGY REPEATER (SINGLE RADIO CARD) .......................................................... 120

 

VII.8

 

MULTIHOP TREE REPEATER ..................................................................................................... 122

 

VII.9

 

HIGH PERFORMANCE REPEATER ............................................................................................. 125

 

VII.10

 

FIXED MESH .................................................................................................................................. 127

 

Содержание ETHERNET TO Wi-Fi GATEWAYS

Страница 1: ...DTUS065 rev A 7 June 27 2014 ETHERNET TO Wi Fi GATEWAYS USER S GUIDE FOR 802 11A B G H N DEVICES...

Страница 2: ...operation or use of the equipment ACKSYS reserves the right to revise this document periodically or change its contents without notice REGULATORY INFORMATION AND DISCLAIMERS Installation and use of t...

Страница 3: ...for 2 4 GHz band 16 III 6 2 FCC rules for 5 GHz band 17 IV ADMINISTRATION OVERVIEW 18 IV 1 WEB INTERFACE 18 IV 2 RESET PUSHBUTTON 18 IV 3 ACKSYS NDM 18 IV 4 EMERGENCY UPGRADE 18 IV 5 SNMP AGENT 18 V T...

Страница 4: ...signature 56 V 9 3 Not using the C Key 57 V 9 4 Replacing a product on the field 57 V 9 5 Working with the C Key in the lab 57 V 9 6 Programming a set of identical C Keys 58 V 10 SPANNING TREE PROTOC...

Страница 5: ...STIONS 137 X 1 HOW IS THE WI FI BIT RATE CHOSEN 137 X 2 HOW MANY CLIENTS ARE HANDLED BY THE ACCESS POINT FUNCTION 137 X 3 WHAT IS THE DIFFERENCE BETWEEN WMM WME IEEE802 11E 137 X 4 MY CISCO ACCESS POI...

Страница 6: ...s reference guide describes the version 2 4 3 of the product firmware If your product contains an earlier version you can download a firmware update from our Internet web site If your product contains...

Страница 7: ...s or distributors will assume no liability for any damage or violation of government regulations arising from failing to comply with these guidelines Information in this document is subject to change...

Страница 8: ...e HTTP and HTTPS Web browser configuration Acksys NDM compatibility SNMP agent for status and configuration Browser based firmware upgrades Emergency upgrade mode Wi Fi capabilities Modes Access point...

Страница 9: ...e characteristics are covered in the quick installation guide of each product Feature WLn ABOARD WLn LINK OEM WLn xROAD WLn RAILBOX Wi Fi radios 2 1 1 1 2 802 11 spatial streams 2 2 3 3 Cellular radio...

Страница 10: ...dictable behavior III 2Antenna types The following sections describe the most commonly used antenna type and the way to install them These explanations rely on good understanding of what a radiation p...

Страница 11: ...pattern below This allows wall mounting without wasting radiations in the wall The gain is generally comprised between 7dBi and 9dBi Antenna Radiation pattern III 2 3 Yagi antenna This kind of antenna...

Страница 12: ...about the Radiation pattern and internal layout III 3Antenna installation They are two major cases when considering antenna installation III 3 1 Non 802 11n case You can establish Wi Fi links from a f...

Страница 13: ...n line of sight the other product is nowhere to be seen clearly III 3 2 802 11n With this norm considerations about EIRP and RSSI are still relevant But the 802 11n takes advantage of MIMO Multiple In...

Страница 14: ...ormances compared to an indoor one because there are potentially no bounces at all This problem can be solved by sending polarized radio waves orthogonal to each other Such so called Slant Antennas ar...

Страница 15: ...ry domain gives the rules to use each RF band To abide by your local laws you must select the country where the product will be installed before activating the Wi Fi card III 6Antenna gain and RF outp...

Страница 16: ...6 36 4 27 500 9 24 250 12 21 125 15 18 62 5 18 15 32 21 12 16 24 In other words if you make use of antennas with a gain higher than 6dBi for every 1 dBi gain over 6 dBi the MAX RF output power must b...

Страница 17: ...tdoor 23 200 6 1 29 800 UNII 3 5 725 5 825 149 to 161 outdoor 29 800 6 1 35 3 2 W 1 If antennas higher than 6dBi gain are utilized a reduction of 1 dB of the MAX RF output POWER is required for every...

Страница 18: ...is activated the DIAG LED will blink quickly This mode allows either to reload the firmware from Acksys NDM or to reset to factory settings see point 2 IV 3 Acksys NDM Acksys NDM can detect the WLn p...

Страница 19: ...ms etc Each layer has its own purpose and addressing scheme The LAN layer address allows a device to send data to another device connected to the same LAN But there is not enough information in a LAN...

Страница 20: ...than a computer equipped with several network connections and used specifically to route packets Here is the path followed by a data packet routed through 2 routers The source and destination IP addre...

Страница 21: ...ware address or MAC address The first three bytes identify the hardware manufacturer e g Hex 00 09 90 for an ACKSYS product The last three bytes change in each product This address is assigned at the...

Страница 22: ...ge has named Class A network the networks 1 x x x 8 to 127 x x x 8 Class B the networks 128 0 x x 16 to 191 255 x x 16 Class C the networks 192 0 0 x 24 to 223 255 255 x 24 A host part with all bits s...

Страница 23: ...e treated as exceptions to this default route Network devices often use the DHCP protocol to get their IP address The DHCP server may provide the address of the local router at the same time V 1 3 3 Z...

Страница 24: ...rivate to public IP datagrams to masquerade the source private IP address into its own unique public IP address It also changes the incoming from public to private IP datagrams replacing the destinati...

Страница 25: ...access point to gain access to other Wi Fi devices or LAN devices Products A B C can communicate with each other Product B relays data between products A and C Product B relays data between the LAN a...

Страница 26: ...communication between clients In this case product A will be able to communicate with product B and the local network but not with product C according to the figure below Product C will also be able t...

Страница 27: ...astructure mode In addition all wireless adapters on the ad hoc network must use the same SSID and the same channel number An ad hoc network tends to feature a small group of devices in very close env...

Страница 28: ...ucts currently implement station and portal functions Products equipped with two radio cards can be used as mesh access points Products A to H can communicate with each other Products A B D E G provid...

Страница 29: ...h ID It takes the same form as the infrastructure SSID but is a separate parameter if you use the same string for an infrastructure SSID and a mesh ID they are considered as two distinct WLANs V 2 5 V...

Страница 30: ...ces baby monitors and old cordless telephones V 3 2 802 11g This transmission standard works in the 2 4 GHz band like 802 11b but operates at a maximum raw data rate of 54 Mbit s or about 20 Mbit s me...

Страница 31: ...reception only Hence an 802 11n radio specification must include three numbers number of transmitters number of receivers and number of spatial streams In order to automatically adapt to radio conditi...

Страница 32: ...twork See appendix for further details about radio channels Depending on the location of the product indoor outside not all wireless channels are available Refer to local regulation which is constantl...

Страница 33: ...mportant when you try to cover a geographic area with several access points Although the use of non overlapping channels 1 6 and 11 has limits when products are too close the 1 6 11 guideline has meri...

Страница 34: ...between each station and its associated Access Point and you can use WEP or WPA WPA2 V 5 1 WEP encryption WEP is a method of encrypting data for wireless communication and is intended to provide the s...

Страница 35: ...authentication However it is quite the reverse It is possible to derive the static WEP key by capturing the four handshake frames in Shared Key authentication Hence it is advisable to use Open System...

Страница 36: ...WPA WPA2 PSK can still be used The authentication process is organized around several agents User also called supplicant or Wireless Node WN Wireless access point or authenticator Authentication serv...

Страница 37: ...802 1x protocol Preauthentication must be enabled in the AP to allow the client to use it WLn clients always use preauthentication when the AP offers it Pre authentication makes the client store comm...

Страница 38: ...y can be from 8 to 63 printable ASCII characters The same password must remain stored in all the mesh nodes V 6 Wired to wireless bridging in infrastructure mode V 6 1 The problem As outlined in secti...

Страница 39: ...very clean solution but needs to manage the subnetwork Strictly spoken this is routing layer 3 networking not bridging layer 2 networking Masquerading Let the client change the wired devices MAC addr...

Страница 40: ...d In this case the bridge itself initiates an ARP for the destination IP address mentioned in the frame triggering from the LAN device a response that will update the table so that the next frame can...

Страница 41: ...hernet MAC addresses in the Wi fi frame adding both the AP and the client Wi Fi MAC addresses So the frame can reach its Wi Fi destination which removes the Wi Fi addresses and retrieves the original...

Страница 42: ...urce MAC address on the wireless interface The cloned address is used for all wireless transactions association authentication and data exchange The original MAC address of the radio card is ignored T...

Страница 43: ...educes data throughput for the client Configuration After activating the proactive roaming feature you must adjust the list of channels scanned by the WLn client You can select one or several channels...

Страница 44: ...e the current bad AP either The required level boost configuration parameter specifies how much better you want the new AP to be in order to begin reassociation The effects of the various parameters a...

Страница 45: ...ce periodically During each period the client will successively switch to configured scan channels send a broadcast probe request frame and wait for responses The probe request contains the SSID among...

Страница 46: ...can threshold to zero disables this feature default When set the scan threshold is compared to the power received from the current AP When the power is greater than the threshold the scan process is i...

Страница 47: ...candidate AP The candidate AP is the AP where you will roam if the roaming is requested Roaming won t occur before the Minimum roaming interval has elapsed since the last association In areas where se...

Страница 48: ...s that the signal power levels of the previous beacons are used like this for the most recent beacon 3 16 18 75 of the signal value for the penultimate beacon 3 16 13 16 15 for the antepenultimate bea...

Страница 49: ...hentication frames 4 Key exchange frames WPA WPA2 EAP with radius server 8 frames 4 Authentication frames Several radius authentication frames 4 key exchange frames The 4 Authentication frames are man...

Страница 50: ...AP1 to process a pre authentication with AP2 During this step the radius server sends the PMK to AP2 and the Wi Fi client They both store the PMK in their local cache At the end of this step the Wi Fi...

Страница 51: ...ly keys This full authentication process produces data that will be stored by the Wi Fi client for the next step Step 2 The Wi Fi client roams on AP2 and uses data stored in the previous step in its a...

Страница 52: ...cific description for each item acksysProductID a code identifying the product network product administration core administration functions adminReset adminSave adminApply adminResetFactory c key mana...

Страница 53: ...Fixed 1 bridge configRadiusTable List of radius servers User defined configDhcpTable List of DHCP pools served Fixed 1 pool Fixed user cannot insert or delete rows User defined user can insert or dele...

Страница 54: ...less client assoc clientLinkAlarm 1 3 6 1 4 1 28097 11 6 Variables may be bound in the notification to provide detailed information about the event Available variables are listed in the MIB for each a...

Страница 55: ...sk key set bridge type to L25NAT therefore not WDS CFGSET 192 168 1 253 configIfStaWds radio0w0 i disable save and apply without rebooting CFGSET 192 168 1 253 adminSave 0 i 1 CFGSET 192 168 1 253 adm...

Страница 56: ...ry settings the internal signature is cleared before rebooting when the user copies the internal configuration to the C Key the internal signature is recomputed so that it is the same as the newly cre...

Страница 57: ...ew it 5 Mount NP in its location reconnect the cables If NP has been used previously and you are unsure whether its configuration disables the C Key 6 Power up NP wait for the Diag LED to turn green 7...

Страница 58: ...boot and configure the product as needed 3 In Tools Set config C Key management select Ignore C Key settings and save option 4 Save and power off 5 Install a C Key and turn power on Wait until the dia...

Страница 59: ...of the available bandwidth resulting in a so called broadcast storm However loops may be useful to create backup routes when a link fails See Point to point redundancy with dual band section for an ex...

Страница 60: ...pages there are two buttons or three buttons After changing parameters press Save to record in permanent memory the parameters changed in this page Press Save Apply to record the parameters and then a...

Страница 61: ...one radio is used to scan multiple channels while the other connects to AP s and transfers data In this mode the scanning process does not disturb data transfers but the scanner radio is reserved for...

Страница 62: ...he 802 11g n mode operates in the 2 4GHz band 802 11g and is compatible with 802 11g and 802 11n devices The 802 11a n mode operates in the 5GHz band 802 11a h and is compatible with 802 11a h and 802...

Страница 63: ...his check box to use the full 5 GHz channels list but in this case you must verify by yourself that the radio channels are used in the respect of local laws a b g n Data Rates tab Automatic supported...

Страница 64: ...he third antenna or both the second and third In order to take advantage of 802 11n multiple spatial streams you must use at least as many antennas as spatial streams The transmit power is distributed...

Страница 65: ...performance on the Wi Fi or when you have hidden stations e g in an exchange between stations A and B a third station which is visible by A but not by B hence interfering with B when it sends to A On...

Страница 66: ...ternally and set to AP role with the same SSID you can fall in this trap by simply activating both radios and changing one of them from AP role to client role The product quickly enters a high priorit...

Страница 67: ...his option allows you to not broadcast the SSID on the network This means that your clients need to know the SSID beforehand since scanning will not reveal the SSID of the AP Mesh ID only in Mesh mode...

Страница 68: ...would depend on the nearest ones to access the 802 1X server EAP security is not available in repeater mode WPA WPA2 PSK can still be used According to the choice you ve made some properties will app...

Страница 69: ...tering a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so that you can enter a...

Страница 70: ...o 63 printable ASCII characters or 64 hexadecimal digits 256 bits The green arrow icons on the right allow to display the key in clear text while you are typing it in Group rekey AP mode only interval...

Страница 71: ...obility domain and NAS ids to take advantage of this feature For more information please refer to section Fast Transition Support 802 11r Key cache life time In any of the EAP modes this indicates how...

Страница 72: ...HAPV2 Custom NOTE Certificates and keys must be provided in PEM format This format is defined by the OpenSSL project It is a text file recognizable by a starting line beginning with BEGIN and the bina...

Страница 73: ...for rekeying the PTK unicast encryption keys in seconds Master rekey interval Time interval for rekeying the GMK master key used internally to generate the GTK in seconds Wireless Security tab SAE Mod...

Страница 74: ...available methods are ARPNAT default value 4 addresses format WDS Wired device cloning PROFINET device cloning This feature requires LLDP forwarding Please read the section Network configuration for...

Страница 75: ...cess must periodically leave the AP channel and thus stop transmitting in order to scan other channels To achieve the best throughput we recommend using only one channel Delay between two successive s...

Страница 76: ...o the currently associated AP But it will still be used if there is no current nor better AP Advanced Roaming tab only in Client mode Excessive signal detection threshold When the perceived signal lev...

Страница 77: ...e corresponding duration depends on the beacon interval set in the AP Maximum time off channel When scanning another channel the current AP is told to buffer incoming data until the client returns to...

Страница 78: ...do not require it WARNING this must not be used alone as an effective security feature since MAC addresses are is easy to masquerade MAC List Enter the client MAC address to deny or allow Enter MAC ad...

Страница 79: ...e path This value must be greater than twice the network diameter traversal time so that the timout covers both a request and its response crossing the largest possible path in the network Active path...

Страница 80: ...o answer back with a HWMP PREP frame that establishes the reverse data path from the root to any node Proactive RANN the root station periodically sends out a broadcast HWMP RANN frame advertising its...

Страница 81: ...7 June 27 2014 Frames filter tab Wireless interfaces included in a bridge type network interface can filter frames as they pass along Filter group Choose one of the filters prepared in routing firewa...

Страница 82: ...Each group is given a different VLAN ID which is used to mark the data frames exchanged within the group Then only devices configured to use the VLAN tag can communicate with other devices inside the...

Страница 83: ...for this interface optional VLAN ID Enter the id for virtual interface If you need to create several VLAN IDs on top of the same physical interface you can use the space character to separate the IDs...

Страница 84: ...SSID Network name also called SSID Priority group The scan process will choose the AP with the SSID of highest priority If you have several APs advertising SSIDs of the same priority the product will...

Страница 85: ...oose DHCP if you have a DHCP server in the network and you want to assign an IP address to the AP In this case you do not need to fill in the fields shown above except possibly DNS Server and Enable S...

Страница 86: ...all interfaces in this network are linked with the software equivalent of an Ethernet switch Enable STP If checked the STP Spanning Tree Protocol will be activated on this bridge If you choose to not...

Страница 87: ...stribute networks between them In each network zone you can Set the forwarding rules towards other zones Set the NAT filtering rules Set the firewall rules a Zones Overview Click the Add zone button t...

Страница 88: ...Force connection tracking By default the firewall disables the connection tracking for a zone if the NAT is not enabled Disabling the connection tracking increases the routing performance Check this o...

Страница 89: ...an specify either a single port or a port range using a dash between the starting and ending ports If this field is blank any port will match Private Port The NAT will replace the original destination...

Страница 90: ...e Drop Drop packet without ICMP message Destination zone Zone where traffic will be forwarded VI 1 4 2 Static routes In this section you can add a static route in the device Target Destination host or...

Страница 91: ...en wikipedia org wiki SYN_flood Drop invalid packets Drop invalid frames or frames without active connection VI 1 4 4 Bridge filter In this section you can manage layer 2 link level filter groups Each...

Страница 92: ...e Multicast Check if the frame is multicast type Check MAC This field is visible only if Mac frame type is different of no filter Src Addr Check the frame type on source MAC address field Dest Addr Ch...

Страница 93: ...or ARP Dest IP Check on the destination IP field in the frame For ARP protocol the Target IP address field was used Src IP Check on the source IP field in the frame For ARP protocol the Sender IP addr...

Страница 94: ...frame Wildcards are not allowed SOURCE PORT The source port of the incoming frame This parameter is valid for TCP UDP protocols only see above You can specify either a single port or a port range usin...

Страница 95: ...istbox allows you to select User or Default QoS parameters Default QoS parameters are given for reference and cannot be modified AP Parameters This table allows you to change the WMM parameters for th...

Страница 96: ...the AP in its management frame CWMIN Defines the minimum contention window size expressed in number of time slots Allowed values are 0 to 12 CWMAX Defines the maximum contention window size expressed...

Страница 97: ...r of leased addresses Lease time if DHCP enabled This represents the time during which a given IP address remain valid After that time the client needs to renew his lease Interface settings LAN Advanc...

Страница 98: ...formation about DHCP options Static Lease This option allows to always give the same predefined IP address according to the client MAC address DNS relay These options enable DNS protection Attack VI 1...

Страница 99: ...and give them mnemonic names Once trigger names have been created you can set their event source and their associated action The event source and the action may need extra parameters depending on the...

Страница 100: ...cation when a client associates or dissociates with one access point Temperature limit The event is triggered when the temperature exceeds the trigger Actions The snmp action when triggered will send...

Страница 101: ...to administrate your product A set of menu is provided and offers simplified the following possibilities VI 2 1 Firmware upgrade Firmware upgrade has its own section in this user manual Firmware Upgra...

Страница 102: ...column Log Settings This frame allows you to set the product log parameters It is possible to send the LOG to an external log server syslog Local Time Settings This frame allows you to set the curren...

Страница 103: ...t the use of domain name requires configuring one or more DNS server addresses in the Network configuration section VI 2 4 Network This panel provides two standard UNIX tools ping and traceroute Place...

Страница 104: ...pt as a backup if the new configuration becomes damaged the backup will be loaded instead at boot time WARNING the WPA keys and the various certificates 802 1x HTTPS will be copied as well Anyone comi...

Страница 105: ...DTUS065 rev A 7 June 27 2014 Reset And Reboot Reset to factory settings This option will restore the default product settings Reboot your device As its name suggests a click on this button will reboo...

Страница 106: ...o This page displays some useful information about the device Providing the content of this page to the ACKSYS support team will speed up the technical support process VI 3 2 Network This page summari...

Страница 107: ...ver its type data or management or modulation kind So it is not comparable to the values appearing in the site survey which concern only probe and beacon frames Also the signal level can vary a lot de...

Страница 108: ...lude access points using the selected channels When the radio card is in access point mode the scan will disconnect associated clients When the radio card is in 802 11s mesh mode some peers seem to ap...

Страница 109: ...this mesh path less is better Discovery Timeout Displays the current discovery timeout for this mesh path in milliseconds Discovery retries As its name implies displays the number of discovery retries...

Страница 110: ...Services VI 3 4 1 DHCP Lease This panel summarizes the properties of all the current DHCP leases VI 3 5 LOG This panel allows to visualize the product logs You can see the Kernel logs logs from linux...

Страница 111: ...is example we are using 802 11a with 20MHz HT mode channel 36 country code FR and ACKSYS as ESSID You can obviously change any of these parameters as long as your choice makes sense Product A Device C...

Страница 112: ...long as your choice makes sense Product A Device Configuration Parameter Value Enable device on 802 11 mode 802 11na HT mode 40 MHz above Channel 36 Country code FR Interface Configuration 1 Public P...

Страница 113: ...VLANs This mode adds a 802 1q tag in the frames sent to the LAN and uses the tag in incoming LAN frames to forward data to the associated SSID The tag itself is not transmitted over the Wi Fi link In...

Страница 114: ...D 5 Interface LAN Network office Protocol DHCP Bridge interfaces Checked Interfaces LAN 3 and office Wi Fi adapter Network Production Protocol None Bridge interface Checked Interfaces LAN 5 and produc...

Страница 115: ...one channel for SCADA Configuration summary In this example we have two different configurations one per radio card For Radio A Public side Mode 802 11na HT mode 40MHz above channel 36 country code FR...

Страница 116: ...ce Configuration 2 Radio B Parameter Value Enable device on 802 11 mode 802 11na HT mode 40 MHz above Channel 44 Country code FR Interface Configuration 2 Radio B Parameter Value Role Access point ESS...

Страница 117: ...ration Parameter Value Enable device on 802 11 mode 802 11na HT mode 40MHz above Channel 36 Country code FR Interface Configuration 1 Parameter Value Role Access point ESSID ACKSYS Product D Device Co...

Страница 118: ...card You can obviously change any of these parameters as long as your choice makes sense For Radio A Mode 802 11ng HT mode 20MHz channel 11 country code FR ESSID ACKSYS1 For Radio B Mode 802 11na HT...

Страница 119: ...eter Value Role Access point ESSID ACKSYS2 Product B Device Configuration Radio A Parameter Value Enable device on 802 11 mode same as product A HT mode same as product A Channel same as product A Cou...

Страница 120: ...int and one bridge infrastructure in the same radio card In the example above Product B acts as a bridge with Product A and as an access point with product C Both products A and B have the same SSID i...

Страница 121: ...lue Enable device on 802 11 mode same as product A HT mode same as product A Channel same as product A Country code any Interface Configuration 1 Radio A Parameter Value Role Repeater ESSID same as pr...

Страница 122: ...ny of these parameters as long as your choice makes sense This topology shows that repeaters interconnection is not limited to a line Nevertheless the repeaters interconnections are limited to a tree...

Страница 123: ...ace Configuration Parameter Value Role Repeater ESSID same as product A Next BSSID Product C radio card MAC address Product C Device Configuration Parameter Value Enable device on 802 11 mode 802 11na...

Страница 124: ...device on 802 11 mode 802 11na HT mode 20MHz Channel 36 Country code FR Interface Configuration Parameter Value Role Access Point ESSID same as product A Product G Device Configuration Parameter Valu...

Страница 125: ...ly change any of these parameters as long as your choice makes sense Mode Product B to Product C 802 11na HT mode 20MHz channel 44 country code FR ESSID ACKSYS1 You can obviously change any of these p...

Страница 126: ...t WDS ESSID ACKSYS1 Device Configuration Radio B Parameter Value Enable device on 802 11 mode 802 11ng HT mode 40MHz above Channel 44 Country code FR Interface Configuration 1 Radio B Parameter Value...

Страница 127: ...ntry code FR ESSID ACKSYS Mode Radio B for Products B C 802 11na HT mode 20MHz channel 40 country code FR ESSID ACKSYS2 Mode Radio B for Products D E 802 11na HT mode 20MHz channel 60 country code FR...

Страница 128: ...er Value Enable device on 802 11 mode Same as product B Radio B HT mode Same as product B Radio B Channel Same as product B Radio B Country code any Interface Configuration Radio B Parameter Value Rol...

Страница 129: ...iguration Radio B Parameter Value Role Access Point ESSID ACKSYS3 Product E Device Configuration Radio A Parameter Value Enable device on 802 11 mode Same as product A HT mode Same as product A Channe...

Страница 130: ...ducts C F H 802 11na HT mode 20MHz channel 36 country code FR MESHID ACKSYS Mode Radio B for Products C 802 11na HT mode 20MHz channel 40 country code FR ESSID ACKSYS1 Mode Radio B for Products F 802...

Страница 131: ...mode 20MHz Channel 40 Country code FR Interface Configuration Radio B Parameter Value Role Access Point ESSID ACKSYS1 Product F Device Configuration Radio A Parameter Value Enable device on 802 11 mod...

Страница 132: ...HT mode 20MHz Channel 44 Country code FR Interface Configuration Radio B Parameter Value Role Access Point ESSID ACKSYS2 HT mode 20MHz Channel 48 Country code FR Interface Configuration Radio B Parame...

Страница 133: ...choose a quiet desk instead of production line wait until the complete product reboot before trying to refresh the web page do not hesitate to contact the ACKSYS support team support acksys fr if you...

Страница 134: ...de All All previous configuration changes will be left unchanged While the product is in Emergency upgrade mode it still allows to restore factory settings by pressing the reset button more than two s...

Страница 135: ...f order If it is blinking quickly the device is in Emergency upgrade mode Check State LEDs The State LED is OFF when the corresponding radio is disabled it is blinking when the product tries to associ...

Страница 136: ...ature which executes the ping command in background and then display the result on the web page A traceroute tool is also available on the same page Check security parameters Check security parameters...

Страница 137: ...developers Documentation mac80211 RateControl minstrel X 2 How many clients are handled by the access point function There can be as many as 2000 clients per AP however performance drops when more th...

Страница 138: ...s accordingly This figure is only an approximation and may vary under very heavy loads X 5 2 What is the roaming delay when the current access point disappears suddenly This can occur when a big obsta...

Страница 139: ...ea Network a part of a network where devices can directly use MAC OSI layer 2 addresses to communicate with each other MCS Modulation and Coding Scheme the way the bits are encoded in radio waves in 8...

Страница 140: ...el The mask requires that the signal be attenuated by at least 30 dB from its peak energy at 11 MHz from the center frequency so that the channels are effectively 22 MHz wide One consequence is that s...

Страница 141: ...200 mW ETSI Europe ETSI US FCC 60 5 300 250 mW FCC 200 mW ETSI Europe ETSI US FCC 64 5 320 250 mW FCC 200 mW ETSI Europe ETSI US FCC 100 5 500 1 W Europe ETSI 104 5 520 1 W Europe ETSI 108 5 540 1 W...

Отзывы: