8821- Data Sheet
Table Of Contents
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 10
Item
Specifications
5-GHz receiver
sensitivity
IEEE 802.11a:
●
6 Mbps: -94 dBm
●
9 Mbps: -93 dBm
●
12 Mbps: -92 dBm
●
18 Mbps: -89 dBm
●
24 Mbps: -86 dBm
●
36 Mbps: -83 dBm
●
48 Mbps: -78 dBm
●
54 Mbps: -76 dBm
IEEE 802.11n HT20:
●
MCS 0: -94 dBm
●
MCS 1: -91 dBm
●
MCS 2: -89 dBm
●
MCS 3: -86 dBm
●
MCS 4: -82 dBm
●
MCS 5: -77 dBm
●
MCS 6: -76 dBm
●
MCS 7: -74 dBm
IEEE 802.11n HT40:
●
MCS 0: -91 dBm
●
MCS 1: -88 dBm
●
MCS 2: -86 dBm
●
MCS 3: -83 dBm
●
MCS 4: -79 dBm
●
MCS 5: -75 dBm
●
MCS 6: -73 dBm
●
MCS 7: -72 dBm
IEEE 802.11ac VHT20:
●
MCS 0: -93 dBm
●
MCS 1: -90 dBm
●
MCS 2: -87 dBm
●
MCS 3: -84 dBm
●
MCS 4: -81 dBm
●
MCS 5: -76 dBm
●
MCS 6: -75 dBm
●
MCS 7: -74 dBm
●
MCS 8: -70 dBm
IEEE 802.11ac VHT40:
●
MCS 0: -90 dBm
●
MCS 1: -87 dBm
●
MCS 2: -85 dBm
●
MCS 3: -82 dBm
●
MCS 4: -79 dBm
●
MCS 5: -73 dBm
●
MCS 6: -72 dBm
●
MCS 7: -72 dBm
●
MCS 8: -67 dBm
●
MCS 9: -66 dBm
IEEE 802.11ac VHT80:
●
MCS 0: -87 dBm
●
MCS 1: -83 dBm
●
MCS 2: -81 dBm
●
MCS 3: -78 dBm
●
MCS 4: -75 dBm
●
MCS 5: -73 dBm
●
MCS 6: -68 dBm
●
MCS 7: -68 dBm
●
MCS 8: -64 dBm
●
MCS 9: -62 dBm
Transmitter output
power
2.4 GHz:
●
802.11b: up to 17 dBm
●
802.11g: up to 14 dBm
●
802.11n HT20: up to 13 dBm
5 GHz:
●
802.11a: up to 14 dBm
●
802.11n HT20: up to 13 dBm
●
802.11n HT40: up to 13 dBm
●
802.11ac VHT20: up to 12 dBm
●
802.11ac VHT40: up to 12 dBm
●
802.11ac VHT80: up to 12 dBm
Antenna
●
2.4 GHz: 2.4 dBi peak gain
●
5 GHz: 3.0 dBi peak gain
Access point
support
●
Cisco unified access points
◦ Minimum: 8.0.121.0
●
Cisco autonomous access points
◦ Minimum: 12.4(21a)JY
●
Cisco Meraki
®
access points
Note: Check deployment guide for more details around access point support and listing.
Wireless security
Authentication:
●
Wi-Fi Protected Access (WPA) versions 1 and 2 Personal and Enterprise
●
Extensible Authentication Protocol – Flexible Authentication via Secure
Tunneling (EAP-FAST)
●
Protected Extensible Authentication Protocol – Generic Token Card (PEAP-
GTC)
●
Protected Extensible Authentication Protocol – Microsoft Challenge
Handshake Authentication Protocol Version 2 (PEAP-MSCHAPv2)
●
Extensible Authentication Protocol – Transport Layer Security (EAP-TLS)
Encryption:
●
40-bit and 128-bit static Wired
Equivalent Privacy (WEP)
●
Temporal Key Integrity Protocol
(TKIP) and Message Integrity
Check (MIC)
●
Advanced Encryption Standard
(AES)
Note: The access point must support
AES as TKIP can only be used as the
broadcast/multicast cipher.
Fast, secure
roaming
●
802.11r (FT)
●
Cisco Centralized Key Management (CCKM)
Signature types
●
Secure Hash Algorithm 1 (SHA-1) and Secure Hash Algorithm 2 (SHA-2)
Bit key types
●
1024, 4028, and 4096 bit keys
QoS
●
IEEE 802.11e and Wi-Fi Multimedia (WMM)
●
Traffic Specification (TSPEC)
●
Traffic Classification (TCLAS)
●
Enhanced Distributed Channel Access (EDCA)
●
QoS Basic Service Set (QBSS)










