Page 36 / 46 Scroll up to view Page 31 - 35
31
Glossary
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix C
MAC (Media Access Control) Address
The unique
address that a manufacturer assigns to each networking
device.
Mask
A filter that includes or excludes certain values, for
example parts of an IP address.
Mbps (MegaBits Per Second)
One million bits per
second; a unit of measurement for data transmission.
MD5 (Message Digest 5)
An algorithm that produces a
128-bit hash. MD5 is a variation of MD4, and increases MD4
security. MD5 verifies the integrity of the communication
and authenticates the origin of the communication.
MDI (Media Dependent Interface)
A cable used for end
stations.
MDIX (Media Dependent Interface with Crossover)
A
cable used for hubs and switches.
MIB (Management Information Base)
MIBs contain
information
describing
specific
aspects
of
network
components.
Multicast
Transmits copies of a single packet to multiple
ports.
Network
A series of computers or devices connected for
the purpose of data sharing, storage, and/or transmission
between users.
NMS (Network Management System)
An interface that
provides a method of managing a system.
OID (Object Identifier)
Used by SNMP to identify
managed objects. In the SNMP Manager/Agent network
management paradigm, each managed object must have
an OID to identify it.
Packet
A unit of data sent over a network.
Ping (Packet INternet Groper)
An Internet utility used
to determine whether a particular IP address is online.
Policing
Determines if traffic levels are within a specified
profile. Policing manages the maximum traffic rate used
to send or receive packets on an interface.
Port
The connection point on a computer or networking
device used for plugging in cables or adapters.
Port Mirroring
Monitors and mirrors network traffic by
forwarding copies of incoming and outgoing packets
from one port to a monitoring port.
Power over Ethernet (PoE)
A technology enabling an
Ethernet network cable to deliver both data and power.
QoS (Quality of Service)
Provides policies that contain
sets of filters (rules). QoS allows network managers
to decide how and what network traffic is forwarded
according to priorities, application types, and source and
destination addresses.
RADIUS
(Remote
Authentication
Dial-In
User
Service)
A protocol that uses an authentication server to
control network access.
RJ-45 (Registered Jack-45)
An Ethernet connector that
holds up to eight wires.
RMON
(Remote
Monitoring)
Provides
network
information to be collected from a single workstation.
Router
A networking device that connects multiple
networks together.
RSTP (Rapid Spanning Tree Protocol)
Detects and uses
network topologies that allow a faster convergence of the
spanning tree, without creating forwarding loops.
Server
Any computer whose function in a network is to
provide user access to files, printing, communications,
and other services.
SMTP (Simple Mail Transfer Protocol)
The standard
e-mail protocol on the Internet.
SNMP (Simple Network Management Protocol)
A
widely used network monitoring and control protocol.
SSH
Secure Shell. A utility that uses strong authentication
and secure communications to log in to another computer
over a network.
SSL (Secure Socket Layer)
Encryption technology for
the Internet used to provide secure transactions, such as
the transmission of credit card numbers for e-commerce.
Static IP Address
A fixed address assigned to a computer
or device that is connected to a network.
STP (Spanning Tree Protocol)
Prevents loops in network
traffic. The Spanning Tree Protocol (STP) provides tree
topography for any arrangement of bridges. STP provides
one path between end stations on a network, eliminating
loops.
Subnet
(Sub-network)
Subnets
are
portions
of
a
network that share a common address component. In
TCP/IP networks, devices that share a prefix are part of
the same subnet. For example, all devices with a prefix of
157.100.100.100 are part of the same subnet.
Subnet Mask
An address code that determines the size
of the network.
Switch
Filters
and
forwards
packets
between
LAN
segments. Switches support any packet protocol type.
TACACS+ (Terminal Access Controller Access Control
System Plus)
Proprietary Cisco enhancement to Terminal
Access Controller Access Control System (TACACS). Provides
additional support for authentication, authorization, and
accounting.
Page 37 / 46
32
Glossary
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix C
TCP (Transmission Control Protocol)
A network protocol
for transmitting data that requires acknowledgement
from the recipient of data sent.
TCP/IP
(Transmission
Control
Protocol/Internet
Protocol)
A set of instructions PCs use to communicate
over a network.
Telnet
A user command and TCP/IP protocol used for
accessing remote PCs.
TFTP (Trivial File Transfer Protocol)
A version of the
TCP/IP FTP protocol that has no directory or password
capability.
Throughput
The amount of data moved successfully
from one node to another in a given time period.
Trunking
Link Aggregation. Optimizes port usage by
linking a group of ports together to form a single trunk
(aggregated groups).
TX Rate
Transmission Rate.
UDP (User Data Protocol)
Communication protocol that
transmits packets but does not guarantee their delivery.
Upgrade
To replace existing software or firmware with a
newer version.
Upload
To transmit a file over a network.
URL (Uniform Resource Locator)
The address of a file
located on the Internet.
VLAN (Virtual Local Area Networks)
Logical subgroups
that constitute a Local Area Network (LAN). This is done in
software rather than defining a hardware solution.
WAN (Wide Area Network)
Networks that cover a large
geographical area.
Wildcard Mask
Specifies which IP address bits are
used, and which bits are ignored. A wild card mask
of 255.255.255.255 indicates that no bit is important.
A wildcard of 0.0.0.0 indicates that all the bits are
important.
For example, if the destination IP address is 149.36.184.198
and the wildcard mask is 255.36.184.00, the first two bits
of the IP address are used, while the last two bits are
ignored.
Page 38 / 46
33
Specifications
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix D
Appendix D:
Specifications
Specifications
Model
WAP200E
Standards
IEEE802.11g, IEEE802.11b,
IEEE802.3, IEEE802.3u,
IEEE802.3af (Power Over
Ethernet), 802.1p (QoS
priority), 802.1Q (VLAN), 802.1X
(Security Authentication),
802.11i - Ready (Security
WPA2), 802.11e - Ready (WMM
& U-APSD), 802.11F (Wireless
Roaming)
Ports
1 Ethernet, 1 External Antenna
Buttons
Reset
Cabling Type
UTP CAT 5
LEDs
Power, Ethernet, Wireless
Operating System
Linux
Management
SNMP Version
1, 2 and 2c
Operating Modes
Access Point
Access Point Mode,
point-to-point Bridge Mode,
point-to-multipoint Bridge
Mode, Repeater Mode
Wireless
Spec/Modulation
802.11b/DSSS, 11g/ODFM
Data Rates
11b: 1, 2, 5.5, 11 Mbps,
11g: 6, 9, 11, 12, 18, 24, 36, 48,
54 Mbps
Channels
11 North America,
13 Europe (ETSI and Japan)
Auto-channel selection
# of Internal Ant.
2x 6dBi (directional)
Ant. connector type
Reverse Polarity Female N-type
Detachable y/n/na
y (sold separately)
RF Pwr (EIRP) in dBm
11.g: Typical -
16.5dBm,
11.b: Typical -
17dBm
Antenna Gain in dBi
Internal antenna: 6dBi
Adjustable power
y
Receiver Sensitivity
11.g: 54Mbps@ -65dBm,
11.b: 11Mbps@ -85dBM
Security
WEP/WPA/WPA2
WEP, WPA-PSK, WPA2-PSK,
WPA-ENT, WPA2-ENT
Connection Control
Wireless Connection Control:
MAC-Based
SSID Broadcast
SSID Broadcast Enable/Disable
802.1X
IEEE 802.1X support
Wireless Client Isolation
Wireless Client devices can
be isolated from each other
either within an SSID or
between two SSIDs.
Both isolation modes can be
enabled in the same time.
Web-based Utility
Access Control
HTTP/HTTPS, wireless client
web GUI access control
Wireless Security
WEP bits
64, 128
WPA bits & params
128 - TKIP/AES
WPA2 bits & params
256 - AES
SSID Broadcast on/off
Yes
Client Isolation
Yes
MAC-based Wireless
Connection Control
Yes
Wireless Web GUI
Access on/off
Yes
Quality of Service
QoS
4 queues
WMM wireless traffic
prioritization
General
Wireless roaming based on
IAPP (802.11F)
Auto-channel selection
Page 39 / 46
34
Specifications
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix D
Environmental
Dimensions
6.42" x 8.07" x 2.17"
163 x 205 x 55mm
Weight
2.47 lb (1.121 kg)
Mounting options
Industrial-strength,
weather-proof housing, NEMA
IP53 rating, lighting protection
for outdoor enclosure, ceiling
or wall mountable
Power
48V DC, 350mA
Max Power Draw
4.8 Watt
PoE In
Yes
PoE Out
No
Certification
FCC, IC, CE
Operating Temp.
-4 to 140ºF (-20 to 60ºc)
Storage Temp.
-4 to 140ºF (-20 to 60ºc)
Operating Humidity
5 to 95%, noncondensing
Storage Humidity
5 to 95%, noncondensing
Page 40 / 46
35
Warranty and Regulatory Information
Wireless-G Exterior Access Point with Power Over Ethernet
Appendix E
Appendix E:
Warranty and Regulatory
Information
Limited Warranty
Linksys warrants to You that, for a period of three years
(the "Warranty Period"), your Linksys Product will be
substantially free of defects in materials and workmanship
under normal use. Your exclusive remedy and Linksys’
entire liability under this warranty will be for Linksys at
its option to repair or replace the Product or refund Your
purchase price less any rebates. This limited warranty
extends only to the original purchaser.
If the Product proves defective during the Warranty
Period call Linksys Technical Support in order to obtain
a Return Authorization Number, if applicable. BE SURE
TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN
CALLING. If You are requested to return the Product, mark
the Return Authorization Number clearly on the outside
of the package and include a copy of your original proof
of purchase. RETURN REQUESTS CANNOT BE PROCESSED
WITHOUT PROOF OF PURCHASE. You are responsible
for shipping defective Products to Linksys. Linksys pays
for UPS Ground shipping from Linksys back to You only.
Customers located outside of the United States of America
and Canada are responsible for all shipping and handling
charges.
ALL
IMPLIED
WARRANTIES
AND
CONDITIONS
OF
MERCHANTABILITY
OR
FITNESS
FOR
A
PARTICULAR
PURPOSE
ARE
LIMITED
TO
THE
DURATION
OF
THE
WARRANTY
PERIOD.
ALL
OTHER
EXPRESS
OR
IMPLIED
CONDITIONS,
REPRESENTATIONS
AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions
do not allow limitations on how long an implied warranty
lasts, so the above limitation may not apply to You. This
warranty gives You specific legal rights, and You may also
have other rights which vary by jurisdiction.
This warranty does not apply if the Product (a) has been
altered, except by Linksys, (b) has not been installed,
operated, repaired, or maintained in accordance with
instructions supplied by Linksys, or (c) has been subjected
to
abnormal
physical
or
electrical
stress,
misuse,
negligence, or accident. In addition, due to the continual
development of new techniques for intruding upon and
attacking networks, Linksys does not warrant that the
Product will be free of vulnerability to intrusion or attack.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT
WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
OUT OF OR RELATED TO THE USE OF OR INABILITY TO
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
The foregoing limitations will apply even if any warranty or
remedy provided under this Agreement fails of its essential
purpose. Some jurisdictions do not allow the exclusion or
limitation of incidental or consequential damages, so the
above limitation or exclusion may not apply to You.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623.
FCC Statement
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this
device must accept any interference received, including
interference that may cause undesired operation.
This product has been tested and complies with the
specifications for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in
a residential installation. This equipment generates,
uses, and can radiate radio frequency energy and, if not
installed and used according to the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the
user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna
Increase the separation between the equipment or
devices
Connect the equipment to an outlet other than the
receiver’s
Consult a dealer or an experienced radio/TV technician
for assistance
FCC Caution: Any changes or modifications not expressly
approved by the party responsible for compliance could
void the user’s authority to operate this equipment.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top