Joel

Members
  • Content count

    60
  • Joined

  • Last visited

  • Days Won

    1

Community Reputation

12 Good

3 Followers

About Joel

  • Rank
    Outstanding
  1. Is there something that we can do to get around with that? Can we ask the network administrator to disable the Captive portal for the mean time and re-enable it once the ENH202 is already connected to the network. Will it hold the connection? Just being curious. Thanks!
  2. Throughput Calculator

    There is no way for us to use the RSSI that the devices are getting and how far the device are apart from each other, right?
  3. Mounting of APs

    How about the outdoor APs that has an Omni Directional type of antenna? Do we mount them the same way?
  4. Also the EWS871AP and EWS870AP will have the same feature once they are released.
  5. WDS Bridge

    Hi Caila, Yes you can. As long as the other model number is using the same chip set, it should work fine. Downside, I'm really sure about that since I haven't encountered issues pairing with other model numbers.
  6. WDS Bridge

    Hi Caila, The setup may work without the devices not seeing each other and getting a good signal but it is recommended for the device to have a perfect line of sight to ensure that the devices can really get a good connection.
  7. It doesn't pass VLAN

    Also make sure that the bridge is connected to the right port where you setup the VLAN.
  8. WAP enclosure

    Hi Ryan, I believe that we can but the signal may be degraded. For APs that has antennas, it would be best if the antennas can be mounted outside the enclosure so that the enclosure will not affect the signal.
  9. It is recommended to use a water based paint.
  10. AES vs. TKIP

    TKIP and AES are two different types of encryption that can be used by a Wi-Fi network. TKIP stands for “Temporal Key Integrity Protocol.” It was a stopgap encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn’t be using it. AES stands for “Advanced Encryption Standard.” This was a more secure encryption protocol introduced with WPA2, which replaced the interim WPA standard. AES isn’t some creaky standard developed specifically for Wi-Fi networks; it’s a serious worldwide encryption standard that’s even been adopted by the US government. For example, when you encrypt a hard drive with TrueCrypt, it can use AES encryption for that. AES is generally considered quite secure, and the main weaknesses would be brute-force attacks (prevented by using a strong passphrase) and security weaknesses in other aspects of WPA2. The “PSK” in both names stands for “pre-shared key” — the pre-shared key is generally your encryption passphrase. This distinguishes it from WPA-Enterprise, which uses a RADIUS server to hand out unique keys on larger corporate or government Wi-Fi networks.
  11. Hard reset after firmware upgrade

    As we know, doing a reset will delete all the settings and information that is set to the device. Performing a reset after the upgrade is actually a requirement specially if the device is encountering issues. It is required so that we can make sure that the new firmware can run properly without the bugs from the old firmware.
  12. Allow or prevent communication between client devices. For Example: Once the Station Separation is enabled, both computers that are connected to the same network will not see each other or share file with each other. This feature can also prevent computers to see printers or other networking devices that are connected to the same AP.
  13. WDS Explanation

    WDS, which stands for Wireless Distribution System, is a feature that enables single-radio APs to be wirelessly inconnected instead of using a wired Ethernet connection. WDS connections are MAC address-based and employ a special data frame type that uses all four of the (MAC) address fields allowed in the 802.11 standard, instead of the three addresses used in normal AP <-> STA (client) traffic. (In the 802.11 frame header, address 1 is the destination address, address 2 is the source address, address 3 is the BSSID of the network and address 4 is used for WDS, to indicate the transmitter address.)
  14. The DuraFon 1X handset has a black bezel around the LCD, the DuraFon 4X has a silver bezel, the DuraFon PRO has a green bezel, and the DuraWalkie has a blue bezel. Additionally, you can remove the battery and see the model on the serial number label.
  15. From an admin phone (ID 11 or 12), PRESS MENU, 9, enter base 10, then PRESS 2 for flash time. The Handset’s default setting is either 500ms (milliseconds) or 600ms. PRESS 1 through 9 to choose from 100ms to 900ms. In some cases adjusting the Flash Time down to 200ms may be necessary behind certain voice lines for proper 3-Way call handling or transferring calls behind a PBX.