User guide
Table Of Contents
- Introduction
- Installation and Initialization
- Managing the Access Point
- Basic Configuration for an Enterprise
- Access Point Features
- Using Web Interface to Manage the Access Point
- Using SNMP Interface to Manage the Access Point
- Using CLI to Manage the Access Point
- Global Configuration Mode
- General Notes
- Configuring the AP using CLI Commands
- Command Line Interface Mode Overview
- User Exec Mode
- Privileged Exec Mode
- Show Command Tree Structure Command
- Show VLAN Command
- Show MAC ACL Command
- Show RADIUS Server Table Command
- Show RADIUS Supported Profile Table Command
- Show Security Wireless Config Table Command
- Show QoS Profile and Policy Command
- Show QoS EDCA Command
- Show Wireless Properties Command
- Show 11n Wireless Properties Command
- Wireless VAP Command
- Ethernet Interface Command
- Network Configuration Command
- Advaned Filter and Global Filter Command
- TCP-UDP and Static MAC Address Table Commands
- Protocl Filter, Filter Type and Filter Control Table Command
- Access Control and HTTP, Telnet and TFTP Commands
- SNMP Read, Read-Write Password and Trap Host Table Command
- Country Code and Management Commands
- System Information Command
- System Inventory Management Command
- Event Logand ICMP Commands
- IP ARP Statistics and SNTP Command
- Syslog configuration and RADIUS Client Authentication Table Commands
- RADIUS Client Access Command
- Interface Statistics Command
- Wireless Station Statistics Command
- IP Address, Subnet Mask and Gateway Command
- Scalar Objects Commands
- Table Entries Commands
- Table Entry Deletion Command
- Table Entry Edition Command
- VAP Table Commands
- Troubleshooting
- ASCII Character Chart
- Bootloader CLI
- Specifications
- Technical Services and Support
- Statement of Warranty

Access Point Features AP-800 User Guide
Configuring the Device
36
• Guard Interval: Guard Interval ensures that distinct transmissions do not interfere with one another. This feature
provides immunity to users. Each user is allotted a time slot to transmit their data and this time slot ends with the
guard interval. This parameter is used to configure the guard interval for the wireless interface.
• Tx Antennas: This parameter enables the transmission antennas. This is configured as bit-mask. Eg: 3 - 011
(binary value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
• Rx Antennas: This parameter enables the receiving antennas. This is configured as bit-mask. Eg: 3 - 011 (binary
value) - first and second antennas are enabled. 7 - 111 (binary value) - all three are enabled.
The bottom enclosure of the device will display R and A with specific numbers, where R stands for Radio and A stands for
Antenna.
Ethernet
The Ethernet feature is the most popular physical layer LAN technology because it strikes a good balance between
speed, cost and ease of installation. Because of these benefits it is an ideal networking technology for the computer
users. Using this feature you can view the properties of the Ethernet of your network.
Ethernet Features
• MAC Address: This parameter represents the MAC address of the Ethernet interface.
• Speed: This parameter is used for configuring the speed of the Ethernet interface.
• Transmit: This parameter is used for configuring the transmit mode of the Ethernet interface.
Security
The AP supports the following security features:
• WEP Encryptions
The IEEE 802.11 standards specify an optional encryption feature, known as Wired Equivalent Privacy or WEP, that is
designed to provide a wireless LAN with a security level equal to what is found on a wired Ethernet network. WEP
encrypts the data portion of each packet exchanged on an 802.11 network using an Encryption Key (also known as a
WEP Key).
When Encryption is enabled, two 802.11 devices must have the same Encryption Keys and both devices must be
configured to use Encryption in order to communicate. If one device is configured to use Encryption but a second device
is not, then the two devices will not communicate, even if both devices have the same Encryption Keys.
• 802.1x Authentication
IEEE 802.1x is a standard that provides a means to authenticate and authorize network devices attached to a LAN port.
A port in the context of IEEE 802.1x is a point of attachment to the LAN, either a physical Ethernet connection or a
wireless link to an Access Point. 802.1x requires a RADIUS server and uses the Extensible Authentication Protocol
Decimal Binary Active Antennas Marking of the Enclosure
1 001 First Antenna A1
2 010 Second Antenna A2
3 011 First and Second Antenna A1 and A2
4 100 Third Antenna A3
5 101 Third and First Antenna A3 and A1
6 110 Third and Second Antenna A3 and A2
7 111 First, Second and Third Antenna A1, A2, and A3