User Manual
User’s Guide Chapter 4 – Reference Manual
Use the antenna diversity to select the best reception signal at the two integrated antennas. The
main antenna is used for transmission whereas both antennas, primary and secondary, can receive
signals. Receive diversity examines only packets directed at the AP. A count of frames received
consecutively with FCS errors is compared to the configured threshold value. When this value is
reached, the receive antenna used is switched to the other antenna. If a directed frame is received
without errors the error count is reset back to zero.
If the antenna diversity option is enabled, the Antenna Used To Transmit and Antenna
Used To Receive settings have no effect.
Antenna Used To Transmit – choose the single antenna for transmitting [primary/secondary].
Antenna Used To Receive – choose the single antenna for receiving [primary/secondary].
Cancel – to restore all previous values.
Apply – to save changed configuration.
Configuration | Security | Wireless Security | Client Isolation
Use the Configuration | Security | Wireless Security| Client Isolation menu to configure the layer
2 user isolation feature. Select the Use Client Isolation checkbox to enable Layer 2 wireless client
separation. In this case connected wireless stations are not able to communicate with each other. The
client stations are isolated on MAC address level.
Figure 33 – Client Isolation Settings
Back – to return to the main Wireless Security Settings page.
Cancel – to restore all previous values.
Apply – to save changed configuration.
Configuration | Security | Wireless Security | Access Control List
In the Access Control Settings page (Access Control List (ACL) menu under the Configuration |
Security | Wireless Security) you can specify default access policy for the Wireless device interface
or define special access rules. To enable Access Control List select the Enable access control list
checkbox.
Default Access: select Accept to allow all mobile clients to access this access point or Reject to
prevent all mobile clients from accessing your access point. Clients may also be subject to rules in the
Access control table.
Gemtek Systems Page 47