Page 10 8. Install 4 short binder head screws in the 4 slots 2 each on left and right sides of the tilt bracket. Set the angle of the AP up or down as required for the installation. The 4 short binder head screws, and the Page 11 1. Install 4 antenna extension cables provided in the kit to the AP Hand tighten. Route the antenna extension cables through the cable guides on the rear of the access point.
The cables cross from left to right to maximize the bend radius. Page 12 This is a good time to add the required grounding lug or cable not included. Install the heavy weather shield. Align the 4 screw holes with the 4 mating screw bosses on the AP Page 13 Deployment Guide 4. The heavy weather shield is clamped between the bracket and the housing. Tighten securely.
Turn the unit over. On the face of the unit, remove and discard the 4 screws located in the cover of the Page 14 AP Access Point 7. Install 4 hex stand-off screws into the screw holes created with the removal of the screws in step 5. Page 15 9. Align the 4 screw holes with the 4 mating screw bosses on the AP cover.
Install the AP mounting bracket to AP cover using 4 short length binder head screws from the kit. The front and rear shields are intentionally staggered to ensure adequate ventilation. Page Power Tap Installation The heavy weather protected AP is now ready for installation. The end user is solely responsible to ensure the unit is installed and maintained by properly certified personnel.
To install an AP Power Tap: 1. Remove and retain the 10 screws used to secure the Power Tap cover. Page 18 AP Access Point 4. Remove and retain the nut with a captive locking washer. This nut releases a solder-less ring terminal.
Loosen the gland nut on the power entry fitting. Expose 6 inches of wire from the jacket. Only use wire suited for your specific installation requirements and application. Page 19 Deployment Guide 8. Using the solder-less ring terminals, strip and terminate the individual wires. Expose only sufficient copper using a solder-less terminal crimping tool to ensure a good electrical connection. No exposed copper strands should be visible outside the terminal insulator.
Page 20 AP Access Point Firmly tighten screws and nut. Configuring WEP Encryption. Configuring KeyGuard Encryption. Configuring Firewall Settings. Available Protocols.
Configuring User Authentication. Mapping Users to Groups. Viewing WAN Statistics. Viewing LAN Statistics. Viewing Wireless Statistics. Viewing Radio Statistics Summary. Viewing Radio Statistics. Retry Histogram. Viewing MU Statistics Summary. Viewing MU Details. Pinging Individual MUs.
MU Authentication Statistics. Viewing the Mesh Statistics Summary. Viewing Known Access Point Statistics. Connecting to the CLI. System Commands. System Radius Commands.
System Log Commands. System Configuration-Update Commands. Firmware Update Commands. Statistics Commands. Mesh Networking Overview.
Mesh Networking Frequently Asked Questions. Adaptive AP Overview. Supported Adaptive AP Topologies. Physical Characteristics.
AP Physical Characteristics. Electrical Characteristics. Radio Characteristics. Antenna Specifications. AP Antenna Specifications. AP Additional Antenna Components. Country Codes. B-2 Embedded Options - Using Option B-6 BootP Options. B-7 BootP Priorities. This guide provides configuration and setup information for the AP and AP model access points. Indicates a condition or procedure that could result in personal injury or equipment damage.
If a problem is encountered with the access point, contact Customer Support. Refer to. Appendix C for contact information. Before calling, have the model number and serial number at hand. If the problem cannot be solved over the phone, you may need to return your equipment for servicing. If that is necessary, you will be given specific instructions. Motorola is not responsible for any damages incurred during shipment if the approved shipping container is not used.
Shipping the units improperly can possibly void the warranty. If the original shipping container was not kept, contact Motorola to have another sent to you. There are no differences in how the devices are configured using the instructions within this guide, even though the Web UI displays AP or AP specifically.
However, there are several differences between the two models you should be aware of. The AP is constructed to support outdoor installations, while the AP model is constructed primarily for indoor deployments. An AP model access point also must use an RJ to Serial cable to establish a serial connection to a host computer.
Additionally, an AP model access point cannot downgrade to 1. It provides connectivity between Ethernet wired networks and radio-equipped mobile units MUs. The access point provides a maximum 54Mbps data transfer rate via each radio. It monitors Ethernet traffic and forwards appropriate Ethernet messages to MUs over the network. If you are new to using an access point for managing your network, refer to Theory of Operations on page for an overview on wireless networking fundamentals.
With this most recent 2. Legacy users can upgrade their firmware image to version 2. For a information overview of the adaptive AP feature as well as how to configure it, refer to. With the 2. The switching of radio bands is based on a timer with no user intervention required. Define a weighted scheme as needed when WLAN traffic supporting a specific network segment becomes critical.
Bandwidth management is configured on a per-WLAN basis. However, with this latest version 2. With this new segregated radio approach, bandwidth management can be configured uniquely for individual WLANs on different access point radios.
For information on configuring bandwidth management, see Configuring Bandwidth Management Settings on page An external AAA server maintains a users and groups database used by the access point for access permissions.
Various kinds of access policies can be applied to each group. With this latest 2. Authentication requests for users belonging to the group are honored only during these defined hourly intervals. For more information on defining access point access policies by group, see Defining User Access Permissions by Group on page Each access point radio can be configured to optionally allow the access point to communicate channel usage data to associated devices and define the beacon interval used for channel utilization transmissions.
The QBSS load represents the percentage of time the channel is in use by the access. For information on enabling QBSS and defining the channel utilization transmission interval, see. The access point has the following features carried forward from previous releases:. One or two possible configurations are available on the access point depending on which model is purchased. If the access point is manufactured as a single radio access point, the access point enables you to configure the single radio for either However, an AP model access point is only available in a dual-radio model.
If the access point is manufactured as a dual-radio access point, the access point enables you to configure one radio for In a corporate environment, the WAN port might connect to a larger corporate network. The access point rests on a flat surface, attaches to a wall, mounts under a ceiling or above a ceiling attic. Choose a mounting option based on the physical environment of the coverage area. Do not mount the access point in a location that has not been approved in an either an AP or outdoor AP radio coverage site survey.
For detailed information on the mounting options available , see Mounting an AP on page or Mounting an AP on page The access point supports several Select the antenna best suited to the radio transmission requirements of your coverage area.
For an overview of the Radio 1 2. The AP model access point uses an antenna suite primarily suited for outdoor use.
A WLAN does not require lining up devices for line-of-sight transmission, and are thus, desirable for wireless networking. Roaming users can be handed off from one access point to another like a cellular phone system. WLANs can therefore be configured around the needs of specific groups of users, even when they are not in physical proximity.
Sixteen WLANs are configurable on each access point. For information on access point MAC address assignments, see. The QoS implementation provides applications running on different wireless devices a variety of priority levels to transmit data to and from the access point.
Equal data transmission priority is fine for data traffic from applications such as Web browsers, file transfers or email, but is inadequate for multimedia applications.
Voice over Internet Protocol VoIP , video streaming and interactive gaming are highly sensitive to latency increases and throughput reductions. These forms of higher priority data traffic can significantly benefit from the QoS implementation.
WMM defines four access categories— voice, video , best effort and background —to prioritize traffic for enhanced multimedia support. The access point supports numerous encryption and authentication techniques to protect the data transmitting on the WLAN. In addition, the access point supports the following additional security features:.
For an overview on the encryption and authentication schemes available , refer to Configuring Access Point Security on page Authentication is a means of verifying information transmitted from a secure source.
If information is authentic , you know who created it and you know it has not been altered in any way since originated. Authentication is critical for the security of any wireless LAN device. Traditional authentication methods are not suitable for use in wireless networks where an unauthorized user can monitor network traffic and intercept passwords.
The use of strong authentication methods that do not disclose passwords is necessary. By default, WLAN devices operate in an open system network where any wireless device can associate with an AP without authorization. Kerberos requires device authentication before access to the wired network is permitted. For detailed information on Kerbeors configurations, see Configuring Kerberos Authentication on page Using EAP, authentication between devices is achieved through the exchange and verification of certificates.
Like Kerberos, the user loses device authentication if the server cannot provide proof of device identification. The access point then requests the identity of the user and transmits that identity to an authentication server. The server prompts the AP for proof of identity supplied to the by the user and then transmits the user data back to the server to complete the authentication process. An MU is not able to access the network if not authenticated. For detailed information on EAP configurations, see Configuring All WLAN devices face possible information theft.
Theft occurs when an unauthorized user eavesdrops to obtain information illegally. The absence of a physical connection makes wireless links particularly vulnerable to this form of theft.
Most forms of WLAN security rely on encryption to various extents. Encryption entails scrambling and coding information, typically with mathematical formulas called algorithms , before the information is transmitted. An algorithm is a set of instructions or formula for scrambling the data. A key is the specific code used by the algorithm to encrypt or decrypt the data. Decryption is the decoding and unscrambling of received encrypted data.
The same device, host computer or front-end processor, usually performs both encryption and decryption. The transmit or receive direction determines whether the encryption or decryption function is performed. The device takes plain text, encrypts or scrambles the text typically by mathematically combining the key with the plain text as instructed by the algorithm, then transmits the data over the network.
At the receiving end, another device takes the encrypted text and decrypts, or unscrambles, the text revealing the original message. An unauthorized user can know the.
Only the sender and receiver of the transmitted data know the key. The level of protection provided by WEP encryption is determined by the encryption key length and algorithm. An encryption key is a string of case sensitive characters used to encrypt and decrypt data packets transmitted between a mobile unit MU and the access point.
An access point and its associated wireless clients must use the same encryption key typically 1 through 4 to interoperate. Use KeyGuard to shield the master encryption keys from being discovered through hacking.
KeyGuard negotiation takes place between the access point and MU upon association. WPA employs WPA2 is a newer Changing just one bit in a message produces a totally different result. Like TKIP, the keys the administrator provides are used to derive other keys.
Messages are encrypted using a bit secret key and a bit block of data. The end result is an encryption scheme as secure as any the provides.
A firewall keeps personal data in and hackers out. The firewall prevents suspicious Internet traffic from proliferating the access point managed network. This combination provides enhanced security by monitoring communication with the wired network. In essence, the trust relationship is extended from one LAN across the public network to another LAN, without sacrificing security.
A VPN behaves like a private network; however, because the data travels through the public network, it needs several layers of security.
The can function as a robust VPN gateway. Content filtering allows system administrators to block specific commands and URL extensions from going out through the WAN port. Therefore, content filtering affords system administrators selective control on the content proliferating the network and is a powerful screening tool. Content filtering. Motorola Support Central responds to calls by email, telephone or fax within the time limits set forth in individual contractual agreements.
In the past, a dedicated power source was required for each access point in addition to the Ethernet infrastructure. This often required an electrical contractor to install power drops at each access point location. An approved solution merges power and Ethernet into one cable, reducing the burden of installation and allows optimal access point placement in respect to the intended radio coverage area. An AP model access point can use one of two approved Motorola single-port solutions.
The Power Tap is a ruggedized solution designed for outdoor deployments , and may be better suited for an installation prone to wind and rain. Operation is subject to the following two conditions: 1 this device may not cause harmful interference, and 2 this device must accept any interference received, including interference that may cause undesired operation.
Operation is subject to the following two conditions: 1 this device may not cause harmful interference and 2 this device must accept any interference received, including interference that may cause undesired operation. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power EIRP is not more than that permitted for successful communication.
When installed adjacent to other equipment, it is advised to verify that the adjacent equipment is not adversely affected. Antennas not included in this list or having a gain greater than 9dBi 2. The required antenna impedance is 50 ohms. Support Central provides our customers with a wealth of information and online assistance including developer tools, software downloads, product manuals and online repair requests. The use of 2. Using the wrong power solution including a non-compliant POE system or a solution not rated for outdoor use could severely damage the AP and void the product warranty.
Health and Safety Recommendations Potentially Hazardous Atmospheres You are reminded to observe restrictions on the use of radio devices in fuel depots, chemical plants etc. Operation of the device without regulatory approval is illegal.
Antennas: Use only an approved replacement. Unauthorized antennas, modifications, or attachments could cause damage and may violate regulations.
Note 1: For 2. For sales and product information: Motorola, Inc. When Motorola devices are professionally installed, the Radio Frequency Output Power will not exceed the maximum allowable limit for the country of operation. Please refer to the Declaration of Conformity DoC for details of other country markings.
All Motorola devices are designed to be compliant with rules and regulations in locations they are sold and will be labeled as required. Any changes or modifications to Motorola equipment, not expressly approved by Motorola, could void the user's authority to operate the equipment. Regulatory markings are applied to the device signifying the radio s are approved for use in the following countries: United States, Canada and Europe see Note 1.
North American Contacts These limits are designed to provide reasonable protection against harmful interference in a residential installation.
0コメント