802.11n/b/g Wireless Outdoor High Power Access Point System version 1.0 User Manual Apply to:
ALCON ACP24 ALCON AMU24 1 U FCC Notices This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. CAUTION: Change or modification not expressly approved by the party responsible for compliance could void the users authority to operate this equipment. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
--Reorient or relocate the receiving antenna.
--Increase the separation between the equipment and receiver.
--Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
--Consult the dealer or an experienced radio/TV technician for help. CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void the user's authority to operate the equipment. RF exposure warning:
The equipment complies with FCC RF exposure limits set forth for an uncontrolled environment. The equipment must not be co-located or operating in conjunction with any other antenna or transmitter. 2 Revision History Version 0.2.4 0.2.8 0.3.2 Date August , 2013 January , 2014 April , 2014 Notes Initial Version Add some features Released version 3 AP Configuration Using Locator While entering the Locator utility, the Locator will automatically search the AP available on the same network. Locator will show the Device Name, Device Type, IP Address, Ethernet MAC Address and Firmware Version in first page. Before start using Locator, make sure you disable personal firewall installed in you PC. (Ex. Windows XP personal firewall) If you have 2 Fast Ethernet Adapter or more, you can choose enable one Fast Ethernet Adapter for enter with Locator utility. AP Configuration Using Web User Interface Before Setup Verify the IP address setting You need to configure your PCs network settings to obtain an IP address. Computers use IP addresses to communicate with each other across a network, such as the Internet. 1. Click Start, select Control Panel. Double-click the Network Connections. 2. Right click the Local Area Connection and click Properties; select Internet Protocol (TCP/IP) for the applicable Ethernet adapter. Then click Properties. 3. Select USE the following IP address, enter 192.168.254.254 (but, 192.168.x.x for the device use) in the IP Address field and 255.255.0.0 in the Subnet Mask field, then click OK. Start Setup by Browser... 1. After getting the correct connection, start the web browser (make sure you disable the proxy) and enter 192.168.x.x (x is outdoor unit IP Address) in the Address field. Press Enter. 4 2. Enter the factory default User name and Password as:
User Name: Admin Password: (leave blank) then click OK. 3. You will enter the Utility homepage. Start Setup by Locator... 1. You just need to click on the Web icon in Locator main page. The Locator will launch a default browser for you and lead you into web UI directly. 5 Wireless Configuration - AP Mode System Information The default operation mode is AP mode. And the first page appears in main page will show System Status -> System Summary automatically, you can find detail system configuration in this page. 6 Client List Automatically, this page can help user to identify current devices who already associated to the AP Throughput This page shows the throughput for both LAN and WAN. It refreshes every 5 seconds. 7 System Log Click Event Log, the device automatically logs (records) events of possible interest in its internal memory. If there is not enough internal memory for all events, logs of older events are deleted, but logs of the latest events are retained. You can start to configure the system. In System Settings page, you can configure:
Device Name You may assign any name to the Access Point. Using memorable and unique names are helpful, especially if you are employing multiple access points in the same network. The device name needs to be less than 32 characters. After verify the name you input, click Apply to save the change. Country/Region Here you can set the AP to follow different country and region regulation. Operation Mode - The default operation mode is Access Point, this connects your wireless PCs and devices to a wired network. In most cases, no change is necessary. You can switch operation mode to Wireless Client, Pt(M)P Bridge or Repeater mode depends on your application. Wireless Client mode allows this device to act as a client within its range. Your Ethernet devices behind the unit can connect to remote AP. Repeater mode is able to talk with one remote access point within its range and retransmit its signal. Choose repeater mode if you 8 want to extend the range of your original AP. Pt(M)P Bridge mode allows Bridge point to point or point to multi-point network architecture, In order to establish the wireless link between bridge radios, the MAC address of remotes bridge(s) need to be registered in the address table. Enter the MAC address with format xx:xx:xx:xx:xx:xx (x is the hexadecimal digit). A Master Bridge Radio may accommodate up to 8 remote MAC addresses. Make sure you click Apply to save the changes before move to next page. IP Settings IP Setting page can configure system IP address. Default IP address is 192.168.1.1 and Subnet Mask is 255.255.255.0. You can manually enter the IP address setting or get an IP from a DHCP server. IP Network Setting Here you can choose to get IP from a DHCP server or specify IP address manually. Choose to obtain an IP address from DHCP server if your environment or ISP provides DHCP server. 9 Otherwise, you can manually setup IP address. IP Address The IP address need to be unique to your network. We would like to recommend you stay with default IP address 192.168.x.x. This is private address and should work well with your original environment. IP Subnet Mask The Subnet Mask must be the same as that set on your Ethernet network. Default Gateway If you have assigned a static IP address to the Access Point, then enter the IP address of your networks Gateway, such as a router, in the Gateway field. If your network does not have a Gateway, then leave this field blank. 10 Spanning Tree Settings Click Spanning Tree Settings under System Configuration menu, Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. Spanning Tree Status: Choose to enable or disable the spanning tree feature. Bridge Hello Time: Specify the number of seconds for the hello time. Bridge Max Age: Specify the number of seconds for the max age. Bridge Forward Delay: Specify the number of seconds for the bridge forward delay. Priority: Specify the number of seconds for the priority. Click Apply to save the changes before leaving this page. 11 In Wireless page, each option is described below Wireless Network -
Wireless Network page allows you to configure the Wireless Mode, Channel /
Frequency, SSID and Security etc. Wireless Mode Default setting is 802.11g/n HT20. This will support all 802.11g clients connect to the AP. You can choose 802.11g in wireless mode column if your environment only has 802.11g clients. Channel / Frequency The channels available are based on the countrys regulation and select the appropriate channel from the list provided to correspond with your network settings. Current Profiles You may configure up to four different wireless profiles. Click Edit to modify the profile and check the Enable box to activate the profile. Profile (SSID) Isolation Stations connected to different profiles cannot access each other. Choose No Isolation (Full access), or Isolate all profiles (SSIDs) from each other using VLAN (802.1Q) standard. SSID Profile The SSID is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. Make sure this setting is the same for all points in your wireless network. For added security, you should change the SSID from the default name Generic, to a unique name. VLAN ID If you have enabled VLAN tagging on your network, specify the VLAN tag ID 1 to 4095. You can assign an SSID to a VLAN. Client devices using the SSID are grouped in that VLAN. Suppressed SSID This option can hide the SSID not available from site survey tool. Enable this function only if you do not want the Access Point to be found by others. Stations Separation Default setting is Disable. This option can disallow the client devices connected to this AP to access each other. Security Mode: By default, the security is Disabled. Refer to the next section to configure the security features such as WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2 and WPA-Mixed. 12 Click Apply to save the changes. 13 Wireless Security -
The wireless security settings configure the security type of your wireless network. There are different wireless security mode options supported by the Access Point. In Wireless Security page, you can configure the AP to work with Disabled
(means no security), WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA, WPA2 and WPA-Mixed mode. Once you setup the AP to work in security mode, all wireless stations will also need to have corresponding settings. System default setting is Disabled. WEP is a basic encryption method, which is not as secure as WPA. To use WEP, you will need to select a default transmit key and a level of WEP encryption. Authentication Type: Select an authentication method. Options available are Open System or Shared Key. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point. The device requesting authentication encrypts the challenge text and sends it back to the Access Point. If the challenge text is encrypted correctly, the Access Point allows the requesting device to authenticate. Input Type: Select Hex or ASCII from the drop-down list. Key Length: Select a key format from the drop-down list. 40/64bit-hex keys require 10 characters or ASCII keys require 5 characters, where as 104/128-bit-hex keys require 26 characters or ASCII keys require 13 characters, as 128/152-bit-hex keys require 32 characters or ASCII keys require 16 characters. A hex key is defined as a number between 0 through 9 and letter between A through F. Default Key: You may use up to four different keys for four different networks. Select the current key that will be used. Key table You can enter 4 different WEP encryption keys into the table and by choosing the radio button to decide which one is valid now. The AP supports 64, 128 and 152bit key length. The longer key we 14 choose usually means the encryption is stronger. After all changes are made, click Save to make sure all changes are saved into system. WPA-PSK stands for Wi-Fi Protected Access Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment. WPA can provide better security level than WEP without difficult setting procedure. Encryption - WPA gives you three encryption methods: Auto, TKIP and AES, with dynamic encryption keys. PassPhrase - Enter a WPA Shared Key of 8-63 characters. The Shared Key should be also applying the clients work in the same wireless network. Group Key Update Interval - Enter a number of seconds which instructs 15 the Access point how often it should change the encryption keys. Usually the security level will be higher if you set the period shorter to change encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page. WPA option features WPA used in coordination with a RADIUS server (this should only be used when a RADIUS server is connected to the Access Point). Encryption WPA gives you three encryption methods: Auto, TKIP and AES, with dynamic encryption keys. RADIUS Server Enter the IP address of your RADIUS server. RADIUS Port Port number for RADIUS service, default value is 1812 RADIUS Secret RADIUS secret is the key shared between Access Point and RADIUS server. 16 Group Key Update Interval This column indicate how often should the Access Point change the encryption key. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Wireless MAC Filter In this page, you can filter the MAC address by allowing or blocking access the network. ACL (Access Control) Mode: You may choose to Disabled, Deny MAC in the List, or Allow MAC in the List. By selecting Allow MAC in the List, only the address listed in the table will have access to the network; all other clients will be blocked. On the other hand, selected Deny MAC in the List means only the listed MAC addresses will be blocked from accessing the network; all other clients will have access to the network. MAC Address: Enter the MAC address. 17 This table lists the blocked or allowed MAC addresses; you may delete selected MAC address or delete all the addresses from the table by clicking Delete. Remember to click Apply to make sure all the changes are saved to system. Wireless Advanced Settings -
The page below can help users to configure advanced wireless setting. Before making any changes in this page, please check your wireless settings on other system as well, as these changes will alter the effectiveness of the Access Point. In most cases, these settings do not need to be changed. Data Rate In data rate column, you can select all bit rate supported in current operation mode. Default value is Auto which means the system will automatically adjust the connection speed dynamically according to your current link status. 18 Transmit Power You can reduce RF output power by selecting adjustable transmit power by 1dBm step from 28 to 3 dBm. Changing transmit power may decrease your wireless signal coverage. This feature can be helpful in restricting the coverage area of the wireless network. You can arrange the different data rate in distance in Access Point mode. Please refer below table. Aggregation When you enable this function, the device will combine several packets and then transmit them as one. This is to reduce the overhead when there are large packets to be transmitted. WMM Choose to Enable or Disable wireless multimedia mode. Distance (1-30km) Setup this parameter according to the longest link distance between the point to point, or point to multi-point in the network. The input needs to be greater than or equal to the real distance. The range can be from 1km to 30km. Wireless Traffic Shaping Choose to enable or disable wireless traffic shaping, specify the incoming and outgoing transmission limit kbit/s. Remember to click Apply to make sure all changes are made before leaving this page. 19 20 Management Administration In the administration page, you can modify the Name and Password for administrator. Changing the login user name and password is as easy as entering the string you wish in the column. Then enter the password in the second column to confirm. This option allows you to create a user name and password for the device. By default, this device is configured with a user name Admin and password is (leave blank). For security reasons, it is highly recommended that you create a new user name and password. Click Apply to finish the procedure. Be sure you noted the modification before apply all changes. 21 SNMP Settings Under System Configuration, click SNMP to display and change settings for the Simple Network Management Protocol. To communicate with the access point, the SNMP agent must first be enabled and the Network Management Station must submit a valid community string for authentication. Select SNMP Enable and enter data into the fields as described below. Click Apply to save the changes. Setting Description Enables or disables SNMP. Sets the location string that describes the system location. Maximum length is 255 characters. Specifies a community string with read-only access. Authorized management stations are able to retrieve MIB objects. Maximum length is 32 characters. Default is public. Specifies a community string with read-write access. Authorized management stations are able to both retrieve and modify MIB objects. Maximum length is 32 characters. Default is private. Enter the IP address of the trap manager that will receive these messages. Enter the community name of the trap manager that will receive these messages. Default is public SNMP Enable/Disable Contact Location Community Name (Read Only) Community Name (Read/
Write) Trap Destination IP Address Trap Destination Community Name 22 Backup/Restore and Reset to factory default Settings In this section, you can Backup/Restore Setting and Revert to Factory Default Settings:
Save A Copy of Current Settings Click Backup, the system will prompt you where to save the backup file. You can choose the directory to save your configuration file. Restore Saved Settings from A File Here you can restore the configuration file from where you previously saved. Revert To Factory Default Settings Be very carefully before restore system back to default since you will lose all current settings immediately. If you act the function, the IP address will restore the establishing value situation. 192.168.1.1 in the IP Address field and 255.255.255.0 in the Subnet Mask field, 23 Firmware Upgrade Enter the location of the firmware upgrade file in the file path field, or click Browse to find the firmware upgrade file. Click Upgrade, and follow the instructions. The whole firmware upgrade process will take around 1 minute. Before upgrade, make sure you are using correct version. Please check with your technical support service if new firmware available. 24 Time Settings This page allows you to configure the time on the device. You may do this manually or by connecting to a NTP server. Manually Set Date and Time: Setup the date and time Automatically Get Date and Time: Select the time zone from the drop down list and then specify the IP address of the NTP server. Click Apply to save the changes. 25 Log Settings This page displays a list of events that are triggered on the Ethernet and Wireless interface. This log can be referred when an unknown error occurs on the system or when a report needs to be sent to the technical support department for debugging purposes. Syslog: Choose to enable or disable the system log. Log Server IP Address: Specify the IP address of the server that will receive the system log. Local Log: Choose to enable or disable the local log. Click Apply to save the changes. 26 Diagnostics Target IP: Specify the IP address you would like to search. Ping Packet Size: Specify the packet size of each ping. Number of Pings: Specify how many times of ping. Traceroute Target: Specify an IP address or Domain name you would like to trace. System Reset There are 2 different mechanisms for the device t reboot: Auto Reboot and Schedule to Reboot. Auto Reboot: When you enable this function, you will need to specify an IP address which you want this device to ping. This IP address could be another wireless device, a server or any device with IP address. And you can decide the time period (in seconds) or the failure counts to trigger this function. Schedule to Reboot: This function is used when there are large data communicating in your network which may cause system unstable as sometimes the buffer memory on different devices such as the Access point, IP camera, switch, or computer would run out and you may find the fastest way to get the whole system back to work by unplug the power
(any device) and power it up again. This is because the buffer memory will be released when you unplug the power. Thus, you may use this function to specify a time that you want this device to reboot. Reboot Now: you can choose to Reboot the Device or Restore to 27 Factory Default. 28 Wireless Configuration Pt(M)P Bridge Mode (Point to Point & Point to Multi-Point) Pt(M)P Bridge is used for wirelessly connect several Access Points, and in doing so extend a wired infrastructure to locations where cabling is not possible or inefficient to implement (be sure you understand the purpose of bridge mode before proceed configuration). Click Wireless Network under Wireless menu, you can configure:
Wireless Setting Wireless Mode Default setting is 802.11g/n HT20. This will support all 802.11g clients connect to the AP. You can choose 802.11g in wireless mode column if your environment only has 802.11g clients. Channel / Frequency The channels available are based on the countrys regulation and select the appropriate channel from the list provided to correspond with your network settings. WDS Link Setting: Select Enable and enter the MAC address. 29 Considerations before installation Loop Prevention Be careful to plan you Wireless Bridge connections, prevent your wireless network topology to have loop. Once loop shows up, you network traffic will become unstable. Performance The system can support up to 8 Wireless Bridge links. But all links and wireless stations that operate at the same time will all share single radio bandwidth (Ex. 11g have 54Mbps bandwidth). Latency In the chain topology configuration, if the chain becomes very long, end-to-end latency issue may come in play. We suggest the Bridge link topology planning should not exceed 2 hops in chain configuration. 30 Wireless Bridge (WDS) Security Wireless Bridge (WDS) now only supports limit wireless security protocol. Here lists Wireless Bridge (WDS) security settings below:
None Both Point to Point and Point to Multi-Point traffic transmit without encryption. AES Both Point to Point and Point to Multi-Point traffic are encrypted by the same AES key. 31 After all changes are made, click Apply to save into system. 32 Wireless Configuration Wireless Client Mode This device can also work as a client device. In order to setup this device to work in such mode, you need to choose Wireless Client mode and click Apply. After the system reboot is done, you can see the page as below. Status page show the device is now working in Wireless Client mode. 33 Connection Status -
This column show current connection status. If this device already connects to an Access Point or station, here will show the MAC address of the associated Access Point or station. Otherwise, connection column will show N/A which means no connection to any Access Point or station. Wireless Client Type Here indicates the information of this device. SSID SSID column displays current SSID assigned to the AP. BSSID Basic Service Set Identifier. This is the assigned MAC address of the station in the access point. Connection Status Showa the current status Associated or N/A. Wireless Mode Shows the Access Point current work in either 11g or 11n mode. Current Channel This column indicates the radio channel currently in use. Security Indicates AP security settings in client mode. Should be either Disabled, WEP or WPA-PSK. Tx Data Rate(Mbps) Shows the current Tx Data rate status. Current noise level This column shows current link quality with AP by noise level in 0 to -96 dBm scale. Signal strength This column shows current link quality with AP by signal strength in 0 to -96 dBm scale. Wireless Network -
34 Wireless Setting Wireless Client Type Default setting is Universal Client which will send out the MAC address of this device. The WDS Client, on the other hand, will send out the MAC address which connected to the device. SSID - The SSID is the unique name shared among all points in a wireless network. The SSID must be identical for all points in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. You can also click Site Survey and choose any available AP; system will determine the Access Point currently available and establish connection with that Access Point. If you already understand your wireless environment well, you can enter the SSID in manually. In Wireless Network page, you can find Site Survey button as shown below. You can click on it to find all wireless networks available in your current environment. The Site Survey page can help you identify all the APs currently working in your environment. Just click on the BSSID column, the system will join you to the SSID you specify. In Site Survey page, you can also see the details of all SSIDs currently available. 35 After you determine which AP (SSID) to join, you can click on the BSSID column your want to choose. The system will automatically join the SSID you specified after reboot. 36 Wireless Security WEP is a basic encryption method, which is not as secure as WPA. To use WEP as a client, you will need to enter a transmit key and a level of WEP encryption exactly the same as the Access Point. Auth Type: Select an authentication method. Options are Open System or Shared Key. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point. The device requesting authentication encrypts the challenge text and sends it back to the Access Point. If the challenge text is encrypted correctly, the Access Point allows the requesting device to authenticate. Input Type: Select Hex or ASCII from the drop-down list. Key Length: Select a key format from the drop-down list. 40/64bit-hex keys require 10 characters or ASCII keys require 5 characters, where as 104/128-bit-hex keys require 26 characters or ASCII keys require 13 characters, as 128/152-bit-hex keys require 32 characters or ASCII keys require 16 characters. A hex key is defined as a number between 0 through 9 and letter between A through F. Default Key: You may use up to four different keys for four different networks. Select the current key that will be used. Key table You can enter 4 different WEP encryption keys into the table and by choosing the radio button to decide which one is valid now. The AP supports 64, 128 and 152bit key length. The longer key we choose usually means the encryption is stronger. Be sure to click Apply to save all settings. 37 WPA-PSK stands for Wi-Fi Protected Access Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment. WPA can provide better security level than WEP without difficult setting procedure. Encryption there are two encryption methods: TKIP and AES, with dynamic encryption keys. Passphrase Key - Enter a WPA Shared Key of 8-63 characters. The Shared Key should be also applying the Access Point work in the same wireless network. Be sure to click Apply to save all settings. 38 39 Wireless Configuration Repeater Mode When you set the device to Repeater mode, the device is able to talk with one remote access point within its range and retransmit its signal. In order to setup the device to work in such mode, you need to choose Repeater and click Apply in System Settings page. Please reboot the device to make sure it works in repeater mode. 40 After enable the repeater mode, you can click Wireless Network and choose Site Survey to pick one of the SSIDs you would like to retransmit its signal
(please be awarded that while using the repeater mode, the throughput performance maybe nearly only half compare with access point mode. Because the repeater needs to communicate with original AP and also the clients associate to the repeater at the same time). 41 After Site Survey, you can choose the Access Point you need to extend its range by clicking BSSID column. Then click Apply to make sure system working properly with new setting. After all the changes are made, you can check the Connect Status page to check current SSID and link quality / signal strength. Wireless Security The wireless security settings configure the security of your wireless network. There are three wireless security mode options supported by the Access Point:
WEP, WPA-PSK, and WPA2 (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WEP stands for Wired Equivalent Privacy). In Wireless Security page, you can configure the AP to work with Disabled (no Security), WEP, WPA-PSK, and WPA2 security mode. Once you setup the AP to work in security mode, all wireless stations will also need to have corresponding settings. System default setting is Disabled. 42 WEP is a basic encryption method, which is not as secure as WPA. To use WEP, you will need to select a default transmit key and a level of WEP encryption. Auth Type: Select an authentication method. Options available are Open System or Shared Key. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the Access Point. The device requesting authentication encrypts the challenge text and sends it back to the Access Point. If the challenge text is encrypted correctly, the Access Point allows the requesting device to authenticate. Input Type: Select Hex or ASCII from the drop-down list. Key Length: Select a key format from the drop-down list. 40/64-bit (10 hex digits or 5 ACSII char) require 10 characters or ASCII keys require 5 characters, while 104/128-bit (26 hex digits or 13 ACSII char) requires 26 characters or ASCII keys require 13 characters, and 128/152-bit (32 hex digits or 16 ACSII char) requires 32 characters or ASCII keys require 16 characters. A hex key is defined as a number between 0 through 9 and letter between A through F. 43 Default Key: You may use up to four different keys for four different networks. Select the current key that will be used. Key table You can enter 4 different WEP encryption keys into the table and by choosing the radio button to decide which one is valid now. The AP supports 64, 128 and 152bit key length. The longer key we choose usually means the encryption is stronger. Be sure to click Apply to save all changes. WPA-PSK / WPA2-PSK stands for Wi-Fi Protected Access Pre-Shared Key. WPA-PSK is design for home users who do not have RADIUS server in their network environment. WPA can provide better security level than WEP without difficult setting procedure. Encryption - WPA gives you three encryption methods: Auto, TKIP and AES, with dynamic encryption keys. PassPhrase - Enter a WPA Shared Key of 8-63 characters. The Shared Key should be also applying the clients work in the same wireless network. Group Key Update Interval - Enter a number of seconds which instructs the Access point how often it should change the encryption keys. Usually the security level will be higher if you set the period shorter to change 44 encryption keys more often. Default value is 3600 seconds, set 0 in Group Key Update Interval to disable key renewal. Remember to click Save to make sure all changes are made before leaving this page. 45 Appendix A: Notice Please refer to the following system grounding diagram for your installation reference. When in doubt, refer to the NEC code to determine proper grounding techniques. For detailed information regarding grounding the outdoor wireless system. 46