all | frequencies |
|
|
exhibits | applications |
---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 4 |
|
User Manual Part 1 | Users Manual | 4.62 MiB | ||||
1 2 3 4 |
|
User Manual Part 2 | Users Manual | 5.80 MiB | ||||
1 2 3 4 | Cover Letter(s) | August 03 2011 | ||||||
1 2 3 4 | Test Report | August 03 2011 | ||||||
1 2 3 4 | RF Exposure Info | |||||||
1 2 3 4 | Cover Letter(s) | |||||||
1 2 3 4 | External Photos | |||||||
1 2 3 4 | Internal Photos | |||||||
1 2 3 4 | ID Label/Location Info | |||||||
1 2 3 4 | RF Exposure Info | |||||||
1 2 3 4 | Cover Letter(s) | |||||||
1 2 3 4 | Test Report | |||||||
1 2 3 4 | Test Setup Photos | |||||||
1 2 3 4 | Operational Description | |||||||
1 2 3 4 | ID Label/Location Info | |||||||
1 2 3 4 | Test Report | |||||||
1 2 3 4 | Cover Letter(s) | |||||||
1 2 3 4 | Test Report |
1 2 3 4 | User Manual Part 1 | Users Manual | 4.62 MiB |
HotPoint Installation & Setup Guide HotPoint 5000 Access Point FWC2050 WLAN Controller HotPoint 5200 MIMO Outdoor Access Point HotPoint 5100 MIMO Indoor Access Point Manual Revision 1.2 2011-01-20 The contents of this Installation Guide are subject to change without notice. Please refer to the Firetide partners web site, partners.firetide.com, for current versions. Safety Instructions Firetide 5200 units must be installed by a qualified professional. Failure to install this equipment properly may result in equipment damage, personal injury, or death. Explanation of Graphic Symbols This symbol alerts the user to the presence of non-insulated dangerous voltage that may be of sufficient magnitude to constitute a risk of lethal electric shock to persons. This symbol alerts the user to important operating, maintenance, and servicing instruc-
tions. Failing to comply with instructions may result in electrical shock. This symbol alerts the user to the presence of important operating, maintenance, and servicing instructions. Failing to comply with this instruction may result in a hazard. Do not open the cover Dangerous voltages inside. No serviceable parts inside. Refer to qualified service personnel. Caution! Risk of electric shock!
POWER LINES CAN BE LETHAL Do not install Firetide products where possible contact with power lines can be made. Antennas, poles, towers, guy wires, or cables may lean or fall and contact these lines. People may be injured or killed if they are touching or holding any part of equipment when it contacts electric lines. Make sure there is NO possibility that equipment or personnel can come in contact directly or indirectly with power lines. ASSUME ALL OVERHEAD LINES ARE POWER LINES The horizontal distance from a tower, pole or antenna to the nearest power line should be at least twice the total length of the pole/
antenna combination. This will ensure that the pole will not contact power if it falls either during or after installation. SURVEY THE SITE Look over the entire site before beginning any installation and anticipate possible hazards. Never assume anything without checking it out for yourself! Dont take shortcuts!
TO AVOID FALLING, USE SAFE PROCEDURES WHEN WORKING AT HEIGHTS ABOVE GROUND Select equipment locations that will allow safe and simple installation. Dont work alone. A friend or co-worker can save your life if an accident happens. Dont attempt repair work when you are tired. Not only will you be more careless, but your primary diagnostic tool - deductive reason-
ing - will not be operating at full capacity. Use approved non-conducting ladders, shoes, and other safety equipment. Make sure all equipment is in good repair. If a tower or pole begins falling, dont attempt to catch it. Stand back and let it fall. If anything such as a wire or pole does come in contact with a power line, DONT TOUCH IT OR ATTEMPT TO MOVE IT. Instead, save your life by calling the power company. Dont attempt to erect antennas or towers on windy days. MAKE SURE ALL TOWERS AND POLES ARE SECURELY GROUNDED, AND ELECTRICAL CABLES CONNECTED TO ANTENNAS HAVE LIGHTNING ARRESTORS. This will help prevent fire damage or human injury in case of lightning, static build-up, or short circuit within equipment connected to the antenna. The HotPoint access point has built-in lightning protection. Be sure that any other equipment connected to the HotPoint access point also has the same level of protection. The base of the antenna pole or tower must be connected directly to the building protective ground or to one or more approved grounding rods, using 10 AWG ground wire and corrosion-resistant connectors. Refer to the National Electrical Code for grounding details. IF AN ACCIDENT SHOULD OCCUR WITH THE POWER LINES DONT TOUCH THAT PERSON, OR YOU MAY BE ELECTROCUTED. Use a non-conductive dry board, stick, or rope to push or drag them so they no longer are in contact with electrical power. Once they are no longer contacting electrical power, administer CPR if you are certified. Immediately have someone call for medical help. 2 HotPoint 5000 User Guide January 2011 Table of Contents The MIMO HotPoint Family . 4 Setting Up Your Equipment . 5 Setting Up Your FWC2050 . 5 Setting Up Your Access Points . 5 Use with Firetide HotPort 7000 Mesh Nodes . 5 Logging In . 6 System Requirements . 6 Logging In . 6 Access Point Tab . 7 Discovery . 7 Configuration Tab . 9 System Menu . 9 Wireless . 14 Security . 18 Profiles . 23 WLAN Network . 26 Captive Portal . 26 Monitoring . 27 Controller . 27 WLAN . 31 Clients . 31 Maintenance . 32 User Management . 32 Upgrade . 33 Backup/Restore . 34 Reboot/Reset . 34 Remote Management . 34 Logs & Alerts . 35 HotPoint 5000 Specifications . 38 FWC2050 Specifications . 39 Reset Procedure . 39 Regulatory Notices . 40 Limited End User Product Warranty . 41 January 2011 Firetide - Reliable Connectivity Anywhere 3 Chapter 1 The MIMO HotPoint Family The Firetide MIMO HotPoint Wireless Access Point System delivers a complete access solution for indoor and outdoor wireless mesh networks. Firetides MIMO HotPoint family consist of three com-
ponents:
The FWC2050 Wireless LAN Controller: Each FWC2050 can control and manage up to 50 Firetide MIMO Access Points. The HotPoint 5100 Indoor Access Point: A dual-radio system support 2.4 and 5 GHz operation in 802.11a, b, g, and n modes. The HotPoint 5200 Outdoor Access Point: A dual-radio system support 2.4 and 5 GHz operation in 802.11a, b, g, and n modes. To ease management of multiple access points in enterprise applications, a virtual AP model is of-
fered. Each FWC2050 WLAN controller can support up to 8 group definitions, and each group sup-
ports 8 profiles per radio - 16 total. Almost any combination of groups and profiles can be applied to individual access points, making it easy to support multiple classes of users and applications on the same hardware. Dual Radio, Dual-Band Support Each 5000 Series MIMO unit has two radios; one operates on the 2.4 GHz band and the other on the 5 GHz band. Outdoor and Indoor Operation Outdoor HotPoint 5200 access points have NEMA 4X/IP67-rated cast aluminum enclosures and a weatherproof connector for attaching to a Firetide HotPort wireless mesh node or a conventional Ethernet port. These units can receive power directly from a HotPort mesh node, eliminating the need for an external power supply. Indoor HotPoint 5100 access points provide wireless access within buildings and moving vehicles. Each indoor access point has a UL2043 plenum-rated enclosure and an RJ-45 connector for attach-
ing to a Firetide HotPort wireless mesh node or a conventional Ethernet port. Complete Stand-Alone System The HotPoint 5000 Series Access Points, under the control of an FWC2050, are a complete stand-
alone system for wireless access service delivery. No other equipment is required. Integration with Firetide HotPort Mesh Networks Firetides HotPoint 5000 Series Access Points can use Firetides HotPort 7000 Series wireless mesh equipment for backhaul to the wired infrastructure. 4 HotPoint 5000 User Guide January 2011 Chapter 2 Setting Up Your FWC2050 Setting Up Your Equipment The FWC2050 can be set up in any indoor location, but the best option is to place the unit in the data center, wiring closet, or other location with access to UPS-protected power and the enterprise backbone network. The FWC requires AC power and a wired Ethernet connection. Refer to the specifications section for details. Figure 1. FWC2050 Controller Setting Up Your Access Points The HotPoint 5100 can be installed in any indoor location. The location should be selected based on antenna and coverage plans - best RF performance is obtained with antennas connected directly to the HotPoint AP, or with short, good-quality cables. The HotPoint 5200 can be installed in any outdoor location. Again, location should be determined by antenna and coverage needs, not by Ethernet or power availability. Figure 2. Firetide HotPoint 5100 Indoor and 5200 Outdoor MIMO Access Points Use with Firetide HotPort 7000 Mesh Nodes In locations where access to Ethernet or power is limited, the HotPoint 5100 and 5200 can be paired with a HotPort 7000 Mesh Node for backhaul. The HotPort 7201/7202 Series is also capable of powering the HotPoint 5100/5200 Series. January 2011 Firetide - Reliable Connectivity Anywhere 5 Chapter 3 Logging In System Requirements The FWC2050 Controller, if used, must have layer 2 or layer 3 connectivity to all Firetide 5000 series Access Points. The system requires a DHCP server. If your network has one, it can be used. If desired, you can use the DHCP server built into the FWC2050. Logging In The default IP address for the FWC2050 is 192.168.224.250. Log in to your FWC2050 Wireless Management System administrative interface for the first time at http://192.168.224.250, using the default username (admin) and password (password) Firetide recommends that you change the user name and password, and the default IP address. 6 HotPoint 5000 User Guide January 2011 Access Point Tab Chapter 4 Discovery Firetide HotPoint 5000 Access Points can operate as stand-alone devices, or be associated with Firetide Wireless Controllers. Controller-
based operation, called Managed Mode, offers many additional features, including roaming. The Controller can auto-discover and man-
age the access points in the same layer-2 domain, or across a layer-3 domain, but certain conditions must be met Discovery for Initial Setup New or factory-reset APs operate in stand-alone mode, unaware of the existence of the Controller. The Controller can discover these units as long as they are on the same layer-2 subnet. Once an AP is discovered, it switches into Managed Mode. APs in Managed Mode will look for a Controller whenever they reboot, using IP multicast. Access Points in stand-alone mode (including any factory-reset APs) can only be discovered within the local subnet. At the end of the discovery process, each discovered AP will be running a controller-based software image and will have attached itself to the controller that discovered it. It will be ready to accept client connections. Re-Discovery Once an AP has been discovered, it remains a Managed AP until it is factory reset. Managed APs will actively look for the Control-
ler after a reboot. This process uses IP multicast, and can work across multiple subnets, if you enable multicast routing for address 224.0.100.250 between controller and the APs. Alternately, you can enable DHCP option 43 on the DHCP server and provide the con-
trollers IP address. APs will get their address via this DHCP server and get the controllers IP as part of the option 43. For the discovery process to work, the FWC 2050 and the APs must be running compatible firmware versions. Contact Firetide for details on firmware levels. In addition, DHCP service must be available, either from a system-wide DHCP server or via the DHCP service offered by the FWC2050. Last Discovered The results of the auto-discovery are shown in the Last Discovered page under Discovery menu. Access Points can also be added manually. Configuration and Image Upgrade on the AP After each reboot of an access point AP, the AP will look for its Controller, using multicast. Upon reconnecting, the AP and Controller will re-synchronize on firmware levels and AP settings. As part of this state machine, the AP will load any new firmware image posted to the controller. It will also synchronize to any configuration changes that were done on the controller while the AP was offline. Managed AP List This displays a list of APs currently under management, and allows you to edit their settings. January 2011 Firetide - Reliable Connectivity Anywhere 7 Discovery Wizard If all APs were not discovered, run the Discovery Wizard. Manual Additions You will be asked to choose between two options:
Option 1 - Add new factory-defaulted APs: Add new factory defaulted AP. This option should be chosen during staging the process. Here the controller and APs are going to be taken out of the box and configured for de-
ployment. Option 2 - Add existing installed APs: Add existing installed APs. This option should be chosen in scenarios where APs are al-
ready deployed and running, and need to be attached to a controller. Depending upon the network topology, you may need to provide the controller with a range of IP addresses to search during discovery. When the process finishes, you will be presented with a list of APs, their model numbers, their IP and their Ethernet MAC ad-
dresses. You can then choose the APs to be managed under this controller. Once this is done, the AP will be upgraded to the controller-based image. 8 HotPoint 5000 User Guide January 2011 Configuration Tab Chapter 5 System Menu General Settings Name:
Country/Region:
This is the FWC2050 name. By default, the name is FWC2050. Firetide recommends changing the name as soon as possible after setting up. The name must contain only alphabets, numbers, and hyphens, and must be 31 characters or less. This field displays the region of operation for the FWC2050 and the Access Points managed by the FWC2050. You must select a country or region. Controller Location Code: This field defines the identifying code for the controller. Time Settings This page lets you configure the time-related settings of your FWC2050 and managed Access Points. Time Zone:
Current Time:
NTP Client:
Select the appropriate local time zone for your region or country. Shows the current time. You cannot set the time; you must use an NTP server. Defines the Network Time Protocol (NTP) server used to synchronize the clock of the FWC2050 and managed Access Points. Check this box if you wish to use an alternate NTP Server. By default, the Firetide NTP server (time. firetide.com) is used by the Access Point. Further information about NTP servers can be found at http://support.ntp.org/bin/view/Servers/WebHome Provide the host name or IP address of the NTP server, if you are using a custom NTP server. Use Custom NTP Server:
Hostname / IP Address:
January 2011 Firetide - Reliable Connectivity Anywhere 9 IP Settings This page lets you to configure the Management IP address setting of the FWC2050. It has the following options:
IP Address:
This is the IP address of the FWC2050. The default IP address is 192.168.224.250. To change it, enter an available IP address from the address range used on your LAN. Enter the subnet mask value used on your LAN. The default value is 255.255.255.0. Enter the IP address of the gateway for your LAN. Enter the IP address of the Primary Domain Name Server (DNS) that you want to use. Enter the IP address of the Secondary Domain Name Server (DNS) that you want to use. Enter the IP address of the WINS server that you want to use. Management VLANs are used for managing traffic (Telnet, SNMP, and HTTP) to and from the FWC2050 and managed Access Points. Frames belonging to the Management VLAN are not given any 802.1Q header when sent over the trunk. If a port is in a single VLAN, it can be untagged, but if the port needs to be a member of multiple VLANs, it must be tagged. The Management VLAN value must be between 1 and 4094. When checked, this option allows one VLAN to be configured as an untagged VLAN. When the FWC2050 sends frames associated with the untagged VLAN out the Ethernet interface, those frames will be untagged. When the FWC2050 receives untagged traffic from the Ethernet interface, those frames are assigned to the untagged VLAN. If unchecked, the FWC2050 tags all outgoing Ethernet frames, and only accepts incoming frames that are tagged with known VLAN IDs. Note: The untagged VLAN checkbox should only be unchecked if the hubs or switches on your LAN support the 802.1Q VLAN standard. Likewise, the untagged VLAN value should only be changed if the hubs and switches on your LAN support the 802.1Q standard. Changing either of these values will result in a loss of IP connectivity if the hubs and switches on your network have not yet been configured with the corresponding VLANs. IP Subnet Mask:
Default Gateway:
Primary DNS Server:
Secondary DNS Server:
WINS Server:
Management VLAN:
Untagged VLAN:
10 HotPoint 5000 User Guide January 2011 DHCP Server List Displays a list of DHCP Servers configured on the FWC2050. Use VLAN Interface:
DHCP Server VLAN ID:
IP Network:
Subnet Mask:
Gateway IP Address:
Starting IP Address:
Ending IP Address:
Use Default DNS Server:
Primary DNS Server:
Secondary DNS Server:
WINS:
Enable this option to provide IP addresses to clients in a specified VLAN. Enter DHCP server VLAN ID. The VLAN ID range is between 1 and 4094. This option is enabled only when Use VLAN Interface is enabled. This provides the IP address for the FWC2050 in specified VLAN; when VLAN is not selected the FWC2050 management IP/VLAN is used. Enter the subnet mask that will be assigned to clients by the Server. Enter the IP address of the default gateway. Enter the starting IP address of the range that can be assigned by the Server. Enter the ending IP address of the range that can be assigned by the Server. This option allows the FWC2050 DNS server to be provided to the clients of the specified VLAN. Enter the IP address of the primary DNS server for the network. Enter the IP address of the secondary DNS Server for the network. This displays WINS server configuration on the FWC2050 for all configured VLANs. January 2011 Firetide - Reliable Connectivity Anywhere 11 Certificates This option lets you add security certificates to your system. There are three elements:
Password:
Controller Key:
Controller Certificate:
CA Certificate:
Encrypts the Controller Key. The private key used by the Controller to decrypt messages. The public key of the Controller. The default key is signed by Firetide. The signed certificate of the Certificate Authority. All keys and certificates are in PEM format. 12 HotPoint 5000 User Guide January 2011 Alerts Syslog Configuration This page lets you configure the settings to connect to a Syslog server. Enable Syslog:
Syslog Server IP Address: Enter the IP address to which the FWC2050 and managed Access Points will send all SysLogs, if Enable the Syslog settings, if you have a Syslog server on your network. SysLog option is enabled. Enter the port number at which your Syslog server is configured to listen to requests. Port:
Alarm Actions This screen lets you define actions to be taken for the four defined alarm conditions. For each condition, you can do nothing, write to syslog, or generate an email to a defined email address. Alarm Email Configuration Alarm messages via email require that a mail server be defined. Server Address:
Port:
User Name:
Password:
Enter the address or name of the mail server (e.g. smtp.firetide.com) Enter the port on which the mail server receives mail. Enter the user name that identifies the Controller that is sending the message. Enter the email system password defined for the account. January 2011 Firetide - Reliable Connectivity Anywhere 13 Wireless Wireless - Basic and Advanced Wireless Settings for Basic and Advanced are similar; except that Advanced allows you to configure settings per Group. Wireless Mode:
Data Rate:
Channel Width (11n):
Guard Interval (11n):
RTS Threshold:
Fragmentation Length:
Beacon Interval:
Aggregation Length:
AMPDU:
RIFS Transmission:
DTIM Interval:
Preamble Type:
Access Point Channel:
This option is enabled when Channel Allocation is disabled. In addition to the default 802.11ng mode, you can also choose 802.11b or 802.11bg. In 802.11bg mode, both 802.11n and 802.11g compliant devices can be used with the AP. If you select this option and other settings on this screen are disabled, select the Turn Radio On radio button to enable options on this screen. This configuration specifies the rate of data frames from AP towards clients. Selecting any value other than best means that the rate will adapt up to the configured rate. Selecting a lower rate is helpful in scenarios where the radio environment is very noisy resulting in high bit errors. A lower rate may impact data throughput negatively. This configures the width of operation of the selected channel and is valid only in 802.11ng or 802.11na modes. The default value is 40 MHz. A wider channel improves the performance, but some legacy devices can only operate on either 20 MHz. This is the interval between two consecutive symbols in a radio transmission. Legacy devices
(802.11b or 802.11g) operate with a long guard interval while 802.11n devices can move between short and long. The default is Auto. Firetide recommends leaving this setting at Auto. If the packet size is equal to or less than this threshold, the data frame is transmitted immediately. If the size is larger than the specified value, then the transmitter must send out an RTS packet, and then must wait for the receiving station to send back a CTS before sending the actual packet data. This is the maximum packet size used for fragmentation. Packets larger than this size will be frag-
mented. The Fragment Threshold value must be larger than the RTS Threshold value. Sets the time period between transmissions of the AP beacon signal. Specifies the maximum permitted length of aggregated frames. Enables aggregation of several MAC frames into a single large frame to achieve higher throughput. Enabling AMPDU may sometimes lead to better network performance. Enables Reduced Interframe Space option. Enabling RIFS may lead to better network performance. This sets the desired Delivery Traffic Indication Message or the data beacon rate. It indicates the message period in multiples of beacon intervals. This value must be between 1 and 255. Long transmit preambles provide a more reliable connection or longer range. Short transmit pre-
amble gives better performance. Auto handles both long and short preambles. The default is Auto. Each Managed Access Point channel can be individually selected. The Access Point mode is either set to the one enabled for the group, or, if the selected mode is not available on the Access Point, to the mode providing highest performance. 14 HotPoint 5000 User Guide January 2011 Channel Allocation Automatic Channel Allocation (ACA), when run, tries to optimize the channel allocation for access points based on clients, user data traffic load and observed nearby RF environment of access points in order to reduce interference. The algorithm takes into consideration interference, traffic load on the AP and neighborhood maps to come up with the best channel for an Access Point. This information, collected over the last 24 hours, is used by the controller to determine the best possible channel for the Access Point. For this reason, Automatic Channel Allocation should be re-run 24 hours (or more) after an initial deployment, so that the algorithm has a good base of performance data for analysis. You can also schedule the algorithm to run at a specified time, or periodically. ACA can be configured to allow allocation of only the specified channels. This ensures that the Access Points only use the channels allowed according to Administration policies. ACA can also be configured to not change channels on any Access Point through which there is data traffic or voice-call traffic (identified by the traffic in WMM voice priority queues). Recommendations Selecting non-overlapping channels for channel allocation is a good practice e.g. for 2.4 GHz use channels 1,6,11. Having channel allocation scheduled once a day allows better management of available bandwidth during the day. It is best to schedule at times when least number of clients are expected to be connected. Automatic Channel Allocation: Enables this mode. Valid Corporate Channels: Lets you select permitted channels. The first check box allows all channels to be for either 2.4GHz or 5GHz to be selected. Prevent Channel Changing During: Lets you delay changes for certain critical traffic. Enabling Active voice call or High Traf-
fic Load prevents a channel change on an Access Point if the respective condition is true. Run Channel Allocation at: Specify at what time of the day the channel allocation can modify access point RF configuration. Run Channel Allocation every: Specify weekly schedule for running channel allocation. January 2011 Firetide - Reliable Connectivity Anywhere 15 RF Management Basic and Advanced RF Management settings are similar, but Advanced allows you to configure settings per Group. Automatic WLAN Healing increases the transmit power of nearby Access Points to cover for an AP losing connection to the con-
troller, or other loss. It works by periodically looking at the radio neighborhood maps and detecting any changes happening in the maps. This feature can be configured to wait for a specified time before any transmit power changes are done on neighbor-
ing Access Points to avoid short intermittent changes happening owing to surrounding environment. Configuration also allows selecting the number of neighboring Access Points which should increase Transmit power to cover for the down Access Point. This feature is configured per Security Profile group and runs between the access points in the same group. Maximum neighbors to participate in Self-Healing: Maximum Number of neighboring access points which increase or de-
crease power to cover for a failing Access Point. Selecting 0 disables this feature. The number of neighbors to participate in healing should not be very large. Three to four usually suffices in most deployments. This avoids too many access points located close to increase power for a single failed Access Point. Self healing wait time after AP failure (in mins): Number of minutes to validate i.e. wait before confirming a failed Access Point and increasing transmit Power to cover the area. Self healing wait time should be configured to a value greater than AP reboot time usually two minutes. This allows for fluctuations in the power of nearby Access Points when Access Points are rebooted. Radio On-Off Times Radio On Settings can be set for the unit as a whole, or per Group. Current Time:
Schedule Radio On/Off:
Schedule at:
Schedule On:
Duration:
Enter the correct current time. If NTP service is enabled, this field displays the local time. Enables and disables this feature. Specifies the time. Specifies the days of the week. Specifies the length of on time. 16 HotPoint 5000 User Guide January 2011 Advanced - QoS Settings QoS settings on the access point control downstream traffic flowing from the AP to client (AP EDCA parameters) and the up-
stream traffic flowing from the client to the AP (station EDCA parameters). Data 3 (Voice):
Data 2 (Video):
Data 1 (Background):
The highest priority queue, minimum delay; ideal for VOIP and streaming media. The second highest priority queue, low delay. Video applications are routed to this queue. Low priority queue with high throughput. Applications which are not time-sensitive but require high throughput can use this queue. The medium priority queue, medium delay. Most IP applications use this queue. Data 0 (Best Effort):
January 2011 Firetide - Reliable Connectivity Anywhere 17 Security Basic Rogue AP Detection Unidentified access points that use the SSID of a legitimate network can present a serious security threat. Detecting rogue ac-
cess points involves scanning the wireless environment on all available channels, looking for unidentified access points. These settings are applied to all managed APs. An AP is defined as rogue if all of the following are true:
1. APs Radio BSSID is observed by any of the managed APs, 2. AP is seen transmitting on the Ethernet side on the same L2 as the APs. 3. At least one client is connected to the AP. Any AP not meeting all of the conditions above is classified as a neighbor. Neighbor APs can be rogue; until a client connects it is not possible to determine whether the AP is rogue or not. Neighbor APs as well as rogue APs will be detected and maintained in the controller. The controller also maintains current count of the rogue APs as well rogue APs seen in the last 24 hours. All Neighbor as well as rogue APs will be displayed, up to a maximum of 512 APs. Neighbor and rogue APs are detected by scanning, and the AP is off-channel during this time. Because the detection interval is long, it will take at least one such interval (and possibly more) for a rogue or neighbor AP to be detected and appear. Rogue AP Detection:
Rogue Detection Interval: The interval at which Rogue Detection required on run on FWC2050. The default Rogue Detection Disabled by default. Alert Severity:
Interval is Low. Sets the severity of the alarm when Rogue APs are detected. 18 HotPoint 5000 User Guide January 2011 This is a sample rogue and neighbor screen:
January 2011 Firetide - Reliable Connectivity Anywhere 19 MAC Address Access Control Lists MAC ACL Restrictions can be applied to the unit, or per Group. Import MAC List from file: Allows you to import a list of MAC addresses. Treat ACL as:
Selected Wireless Stations: This table lists the stations that have been allowed access to the network through this Access Point. Click Delete to delete a wireless station from the Selected wireless clients table list. Enter a MAC address and Click Add to add the MAC address of the wireless stations to the Selected wireless clients table list. Lets you specify whether the imported list is allow or deny. Available Wireless Stations: This table lists the Wireless stations that are present in the vicinity of the Access Point. Click Refresh to update this list in the table. Select a station in the Available Wireless Stations table and click Move to move the station to the Selected wireless clients table. Authentication Server Selection This lets you select one of three authentication servers. 20 HotPoint 5000 User Guide January 2011 Configuring a RADIUS Authentication Server Primary Authentication Server: The Primary Authentication Server is the main Radius server used for authentication. The IP Address, Port, and Shared Secret information is required to communicate with Radius Server. The Shared Secret is shared between the Wireless Access Point and the Radius Server while authenticat-
ing the Wireless client. Secondary Authentication Server: A Secondary Authentication Server can be configured for use if the Primary Authentication Server fails or is unreachable. The IP Address, Port, and Shared Secret information is required to communicate with the Radius Server. The Shared Secret is shared between the Wireless Access Point and the Radius Server while authenticating the Wireless client. Primary Accounting Server: The Primary Accounting Server is used for accounting on the network. The IP Address, Port No., and Shared Secret information is required to communicate with Radius Server. The Shared Secret is shared between the Wireless Access Point and the Radius Server while authenticating the Wireless client. Secondary Accounting Server: A Secondary Accounting Server can be configured to use if the Primary Authentication Server fails or is unreachable. The IP Address, Port No., and Shared Secret information is required to com-
municate with Radius Server. The Shared Secret is shared between the Wireless Access Point and the Radius Server while authenticating the Wireless client. Re-authentication Time (Seconds): This is the time interval in seconds after which the supplicant will be authenticated again with the RADIUS Server. The default interval is 3600 seconds. Update Global Key Every (Seconds): Enable this option to have the Global Key changed according to the time interval speci-
fied. If enabled, enter the desired time interval. The default is enable, and the default interval is 1800 Seconds. January 2011 Firetide - Reliable Connectivity Anywhere 21
1 2 3 4 | User Manual Part 2 | Users Manual | 5.80 MiB |
Configuring RADIUS per Group RADIUS server parameters can also be configured per Group. Settings are the same as for a system-wide RADIUS server. Configuring an LDAP Authentication Server Server IP:
Server Port:
User Base DN:
Admin Domain:
Domain Admin User:
Domain Admin Password: Password for Domain Admin User. Enter the LDAP Server IP address. Enter the servers port number. Enter the DN for the base of users. Defines the administrative domain. User name for administering domain. 22 HotPoint 5000 User Guide January 2011 Profiles Profiles are the basic building blocks of HotPoint AP configurations. They represent the settings of a virtual machine that can be in-
stantiated on any HotPoint unit. Profiles are a set of configuration that can be applied onto an AP. These configurations include radio parameters, load balancing and rate limit parameters. Each access point under the control of the FWC2050 is capable of supporting 8 profiles per radio, or 16 profiles in total. Small Networks For small scale WLAN networks, you can use the basic configuration, and you dont need to create additional profile groups. All APs will belong to the same group and have the same configuration. Larger Networks For larger deployments, comprised of different sets of WLAN networks, you will need to use the advanced profile option. Under the Advanced profiles tab, you can create, edit, and delete profile groups. Editing a profile group will take the user to a profile edit page similar to the one under basic setting. The Delete button, at the bottom of the screen, will delete the selected profile. Once the creation of the profiles are done, you can go to the Configuration->WLAN Network page to assign profile groups to the APs. For ease of use, during a profile add, an option is given to the user to clone a profile. Cloning of a profile copies all the settings except the name and SSID. Configuration templates for Authentication Server Settings in case of LDAP/Radius and MAC ACL list configuration needs to be done separately in their respective pages under Security. Once done, you can assign one of the created security profiles to a particular profile. Profile Groups Complex deployments may require multiple sets of profiles. Groups are a way of managing large numbers of profiles. The controller sup-
ports configuration of up to 8 distinct set of grouped profiles. Each profile group can contain up to 16 profiles. You can configure these profiles and profile groups without worrying about the state of the APs. Once the APs connect to the controller these profile configura-
tion will be pushed onto the AP. This is the method used to configure the WLAN network offline and then push the configuration once the WLAN network is up and running. Two groups are defined by default. Additional groups can be created by clicking on the + tab next to the groups, in the Configuration
- Profile - Advanced - Radio section, as shown below. January 2011 Firetide - Reliable Connectivity Anywhere 23 Basic and Advanced - Radio Settings for Basic and Advanced are similar, except that the Advanced option allows you to configure settings per Group. Displays encryption type. Displays user-assigned name of profile. Displays the SSID of access point. Enables broadcasting of the SSID in the clear. Name:
SSID:
Broadcast SSID:
Network Authentication: Displays type of authentication required. Data Encryption:
Wireless Client Security Separation: Controls security among clients connected to AP. VLAN:
MAC ACL Group:
Captive Portal:
Wi-Fi Multimedia (WMM): Enables WMM mode. Select this option to ensure that applications that require better throughput and performance are provided special queues with higher priority. WMM defines the following four queues in decreasing order of priority:
The highest priority queue, minimum delay; ideal for VOIP and streaming media. The second highest priority queue, low delay. Video applications are routed to this queue. The medium priority queue, medium delay. Most IP applications use this queue. Low priority queue with high throughput. Applications which are not time-sensitive but require high throughput can use this queue. Specifies VLAN for traffic to/from this Profile. Defines MAC address Access Control List preferences. Defines which, if any, captive portals are being managed. Voice:
Video:
Best Effort:
Background:
With WMM enabled, QoS prioritization and coordination of wireless access is on. Disabling WMM will deactivate QoS control of station EDCA parameters on upstream traffic flowing from the station to the access point. WMM Powersave:
Enables Powersave option for WMM. 24 HotPoint 5000 User Guide January 2011 Load Balancing Max Client:
RSSI:
The maximum number of clients the that can connect to this profile. Defines the weakest signal that the APs in this profile will accept. The controller supports balancing of load on the APs it manages. This is based on the number of clients connected to APs as well as signal quality of clients. At the time a client discovers APs (using probe requests) or sends association frames, AP de-
cides whether to accept a client or not based on the number of clients already connected or the signal strength of the clients. The two configurations are:
Max Clients: The maximum number of wireless clients that can connect to each radio of Access Point at one time. A value of 64 can be selected to specify to allow maximum supported by Access Point. RSSI: The minimum signal quality in percentage (0 - 100) % expected from the wireless clients that connect to the Access Points. A value of 0 means this check is not enforced and load balancing is disabled. Setting the Max. number of clients to a low value (compared to the total number of client in an office/floor) is recommended when there are several APs and the administrator would like a good distribution of clients between the access points. Setting the RSSI to a high percentage would mean that only clients near to APs will be permitted to associate to the APs and is good in situation where the throughput expectation is high. In scenarios, where the clients can be expected to be far away
(or the number of APs is less), this should be set to a lower value. Basic and Advanced - Rate Limiting The Rate Limiting feature can be configured differently for each BSSID in security profile group. Rate limiting is done per BSSID and is configured as a percentage of available bandwidth. Available bandwidth is determined by the number of errors occurring during transmission and the amount of time a packet spends in the transmission queue. The available bandwidth is distributed among the BSSIDs configured on the Access Points as a specified percentage. The per-
centage configured for a BSSID is shared among all the clients connected to it. The total of the percentages distributed among the BSSIDs can be up to 100%. Rate Limiting can be disabled by setting the limit to 0%. This can be useful for having BSSIDs for management/administration/
testing. Rate Limit: The slider bar and value specify configured rate limit values. January 2011 Firetide - Reliable Connectivity Anywhere 25 WLAN Network This screen allows you to assign each AP to a group. Captive Portal The Captive Portal allows you to require the user to log in, and optionally accept a EULA, in order to use the wireless service. Portal Type:
Portals can be guest (open to all) or require an ID and password. In Guest mode, the user must enter an email address to gain access. In Captive mode, the user must enter a user name and pass-
word. These values are defined as shown in Maintenance on page 32. Allows you to position the login in a location compatible with the background image. Select Placement:
Load Background Image: Allows you to place an image with logos, etc as required for your application. EULA Text Required:
You can optionally require a EULA. Enter the EULA text in place of the test text, and tick the en-
able box. 26 HotPoint 5000 User Guide January 2011 Monitoring Chapter 6 Controller Summary This screen displays a summary of the current managed Access Point status, rogue access points detected, current wireless sta-
tions connected, FWC2050 System Information and Network Usage. Clicking on the individual windows will lead to a new screen showing greater detail. Up:
Down:
Critical:
Managed Access Points running properly. Number of managed Access Points which cannot be pinged. Number of managed Access Points which can be pinged but cannot be logged in or device is dif-
ferent from the one which was configured. Number of managed Access Points whose configuration differs from the one which is set on the FWC2050. This is mostly owing to Access Point having an unsupported software version running or configuration changes were done on WMS when Access Point was Down/Offline. The number of unique rogue/neighboring Access Point bssid which can be observed now. The number of unique rogue/neighboring Access Point bssid observed over the last 24 hrs. This section displays count of Current Wireless Stations of managed Access Points. Major:
Rogue AP Current:
Rogue AP Count 24hrs:
Wireless Clients:
FWC2050 Firmware Version: Current FWC2050 firmware version. Controller Uptime:
Last Reboot:
Last Configuration Change: When last configuration change was done on the FWC2050. Last Channel Allocation: When last automatic channel Allocation was performed. Last Admin Login:
Time since last controller restart. When was the FWC2050 rebooted last time. When Admin logged in last time. January 2011 Firetide - Reliable Connectivity Anywhere 27 Usage This shows the transmit, receive, and network usage rates for the AP. Access Point List This shows the status of each AP under management. Name:
Location:
Status:
MAC Address:
IP address:
Model:
Building:
Floor:
2.4 GHz channel:
5 GHz channel:
Uptime:
Displays name of Access Point. Displays location of Access Point. Displays status of Access Point. Displays MAC Address of Access Point. Displays management IP address used by the FWC2050 to connect to Access Point. Displays Access Point Model. Displays building name where Access Point is located. Displays floor where Access Point is located. Displays 2.4 GHz channel configured on Access Point. Displays 5 GHz channel configured on Access Point. Shows elapsed time since last AP reboot. 28 HotPoint 5000 User Guide January 2011 Clients This shows connected clients. Rogue AP List This shows a list of detected rogue APs. You can double-click on an AP to see a detailed view. The shaded region (at right in this example) shows the estimated location of the rogue AP. January 2011 Firetide - Reliable Connectivity Anywhere 29 Profiles SSID:
Security:
Mode:
Status:
Group Name:
DHCP Lease Wireless SSID configured for that Profile. Open/wep/wpa/wpa2 authentication mode of security. 802.11 b/bg/ng or 802.11 a/na mode for security profile. Indicates usage of that profile. Name assigned to the group. The DHCP Lease screen displays current DHCP clients which have been allocated IP addresses. Host Name:
IP:
End Time:
End Date:
MAC:
VLAN:
The host name of the client, if possible to resolve. IP address allocated to DHCP client by the FWC2050. The DHCP Lease End time for DHCP client. The DHCP Lease End date for DHCP client. The Ethernet MAC address of DHCP client. VLAN the Client is using to connect. Use the REFRESH button to update client DHCP Lease display. Guest List This shows IP address and email addresses (obtained during guest access login). 30 HotPoint 5000 User Guide January 2011 WLAN SSID Mapping This shows the SSIDs detected within range of the AP network. Clients Local Client List This screen shows connected clients. Blacklisted Clients This screen shows blacklisted clients. January 2011 Firetide - Reliable Connectivity Anywhere 31 Chapter 7 User Management Maintenance This allows adding and removing FWC2050 administrative users. admin is the default user with administrative privileges and cannot be removed. User Name:
Old Password:
User Type:
Add the name of the new user. Enter the old password to make changes. Specify the type of access permitted to FWC2050 user Read-only/Administrative. A read-only user cannot make any configuration changes. He is allowed to see the all the statistics and configura-
tion information. Type a new user password. Retype the new user password to confirm. Password:
Confirm Password:
32 HotPoint 5000 User Guide January 2011 Upgrade Upgrade FWC2050 Firmware You can install a new version of the FWC2050 software using the Firmware Upgrade page. You have a choice of three methods. You can use a local file, or FTP or TFTP to access a remote file. You can also set the upgrade to occur immediately, or at a scheduled time. Go to the Firetide Web site (www.Firetide.com) customer service downloads section to get new versions of the FWC2050 software. Includes AP firmware. IMPORTANT! Once you click Upload do NOT interrupt the process of sending the software to the FWC2050 and restarting the FWC2050. January 2011 Firetide - Reliable Connectivity Anywhere 33 Backup/Restore Backup:
Restore:
Allows you to save the settings of the FWC2050 to a file. Configures the FWC2050 to the settings previously saved. Reboot/Reset Both Controllers and Access Points can be rebooted or reset to factory parameters. Remote Management Session Timeout You can specify a time period for automatic disconnect if the management connection remains idle. 34 HotPoint 5000 User Guide January 2011 Logs & Alerts Numerous Log Types are available. System Alerts Log Shows logged events. The results can be filtered. RF Events Log Shows logged RF events. January 2011 Firetide - Reliable Connectivity Anywhere 35 Load Balancing Shows occurrences of load balancing among APs. Rate Limit Events Shows occurrences of rate-limit events on clients using excess bandwidth. 36 HotPoint 5000 User Guide January 2011 Saving Logs Logs from individual APs and the FWC2050 Controller can be saved. AP Logs Select an AP to save a log of events associated with it. You will be prompted to enter a file name and select a location. System Logs You will be prompted to enter a file name and select a location. January 2011 Firetide - Reliable Connectivity Anywhere 37 Appendix A HotPoint 5000 Specifications Common Specifications Wireless Interface Networking Up to 16 SSIDs (8 groups, 8 profiles) per HotPoint Up to 16 independent VLANs Model 5100 5200 Bands 802.11a 802.11n 802.11b/g 802.11n Use Indoor, Worldwide. Radio 1: 2.4, Radio 2: 5 GHz Outdoor, Worldwide, Radio 1: 2.4, Radio 2: 5 GHz Frequency (GHz) 5.15-5.25 5.25-5.35 5.725-5.825 4.9-5.090 4.94-4.990 5.470-5.725 2.412-2.484 Restrictions Indoor use only Japan only US Public Safety ETSI 301.893, U-NII Bands (GHz) 802.11a 5.725-5.825 UNII-3 802.11n 5.470-5.735 UNII 5.25-5.36 UNII-2 5.15-5.25 UNII-1 802.11b 802.11g, n Max TX Power 20 dBm 20 dBm 20 dBm 20 dBm 20 dBm 20 dBm 17 dBm 20 dBm 20 dBm Supported Data Rates & Standards 802.11a 6/9/12/18/24/36/48/54Mbps 802.11a Capable of switching to 14 and 12 rates for 4.940 4.990 GHz Public Safety Band 802.11b 1/2/5.5/11Mbps 802.11g 6/9/12/18/24/36/48/54Mbps 802.11n 6.5/13/19.5/26/65/130 (20MHz LGB) 7.2/14.4/21.7/28.9/72.2/144 (20MHz SGB) 13.5/27/40.5/54/135/270 (40MHz LGB) 15/30/45/60/150/300 (40MHz SGB) Network Standards: IEEE 802.11a/b/d/g/e/f/h/i/n Dynamic Frequency Selection (DFS) capable in conjunction with Firetide Software application Security: WPA; 64/128/256 w/TKIP, AES Power 48 VDC via DC connecter or 802.3af PoE Environmental Humidity (non-condensing): 10% to 90%
Storage humidity (non-condensing): 5% to 95%
Maximum altitude 15,000 feet (4600 meters) 38 HotPoint 5000 User Guide Security, Authentication and Encryption 802.11i, WPA2 40-bit, 104-bit WEP keys 802.1x, RADIUS authentication SSID suppression MAC-address access control Management and Configuration Integrated mesh and access management Multiple user interface options:
Centralized management via HotView Pro Built-in web-based management Command line interface (CLI) Remote firmware upgrade Auto AP discovery Physical AP grouping Hot Spot Services Virtual AP grouping User-based rate limiting Intercell/intracell blocking Captive portal management Walled garden Client-based policy management Client Access Features Up to 128 concurrent users simultaneously per HotPoint L2 Fast Roam and L3 seamless mobility with controller Fast handoff enabled 802.11e (WMM) (Quality of Service) Auto configuration and image download Network Ports One 10/100/1000 autosense Base-T port IEEE 802.3,802.3 at based PoE Warranty Hardware: one year limited warranty Software: 90 days limited warranty January 2011 5200 Outdoor Unit Specifications 5100 Indoor Unit Specifications Network Port One 10/100/1000 Mbps Ethernet port with weatherproof con-
nector IEEE 802.3, 802.3u compliant CSMA/CD 10/100/1000 autosense Enclosure Cast aluminum NEMA-4X/IP66 enclosure Six N-type antenna connectors Weatherproof 48VDC power connector Weight: 3.75 lbs (1.7 Kg) with bracket Dimensions: 8.2 x 8.6 x 2 (205 x 214 x 100 mm) Environmental Specifications Operating temperature: -40 C to +60C Storage temperature: -40 C to +85 C Included Accessories Bracket for pole and wall mounting AC power adapter Three 2.4 GHz and three 4.9-5.8 GHz 3 dBi omni staging anten-
nas, for indoor and temporary use only. Network Ports 10/100/1000 Mbps Ethernet port PoE PD on Port 1 IEEE 802.3, 802.3u compliant CSMA/CD 10/100/1000 autosense Enclosure Plenum-rated metal enclosure Six RP-SMA antenna connectors One DC power connector, 12 VDC 15%, 3 A One Ethernet connector Weight: 0.9 lbs (.4 Kg) Dimensions: 7.3 x 6.8 x 1.4 (182 x 170 x 35 mm) Environmental Specifications Operating temperature: 0 C to +60C Storage temperature: -20 C to +70 C Included Accessories AC power adapter Three 2.4 GHz and three 4.9-5.8 GHz 3 dBi omni staging anten-
nas, for indoor use only. Appendix B FWC2050 Specifications Physical Specifications Network Ports Enclosure Power Environment Specifications Included Accessories Four GigE 10/100/1000 Mbps Ethernet ports with LEDs IEEE 802.3, 802.3u compliant CSMA/CD 10/100 autosense LEDs (power, 2.4 GHz, 5 GHz) Reset button (recessed) Weight: 2 lb 14 oz (1.3 kg) Dimensions 9.4 X 5.9 X 1.6 DC Input: 12 VDC, 2.5 A Port 1: IEEE 802.3at compliant PoE External power supply: 100240 VAC, 50/60 Hz Operating temperature: 0C to +60C Storage temperature: -20C to +70C Humidity (non-condensing): 10% to 90%
Storage humidity (non-condensing): 5% to 95%
Maximum altitude 15,000 feet (4600 meters) AC power adapter with cord (non-North America power cord is separate orderable item) Bracket for Rack Mounting Appendix C Reset Procedure Firetide Access Points may be reset to factory parameters. This is useful when returning a unit from field service or in recovering a unit you cannot communicate with. To reset a unit, apply power and wait for the unit to fully boot. This takes 60 to 90 seconds. Use a paperclip to press and hold the reset button for 15 seconds. Wait for the units to reboot before removing power. January 2011 Firetide - Reliable Connectivity Anywhere 39 Appendix D Regulatory Notices FCC Part 15 Note These devices comply with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operation. FCC Class A Notice This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference. This equipment generates, uses and can radi-
ate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure To ensure compliance with the FCCs RF exposure limits, the antenna used for this transmitter must be installed to provide a separation distance of at least 40 cm from all persons and must not be co-located or operated in conjunction with any other antenna or transmit-
ter. Installers and end users must follow these installation instructions. Modifications Any modifications made to this device that are not approved by Firetide, Inc. may void the authority granted to the user by the FCC to operate this equipment. Installation Antenna(s) for the Model 5200 outdoor unit must be installed by a qualified professional. Operation of the unit with non- approved antennas is a violation of U.S. FCC Rules, Part 15.203(c), Code of Federal Regulations, Title 47. Canadian Compliance Statement This Class A Digital apparatus meets all the requirements of the Cana-
dian Interference-Causing Equipment Regulations. The device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-
channel mobile satellite systems. The maximum antenna gain permitted for devices in the bands 5250-
5350 MHz and 5470-5725 MHz shall comply with the EIRP limit. The maximum antenna gain permitted for devices in the band 5725-
5825 MHz shall comply with the EIRP limit specified for point-to-
point and non point-to-point operation as appropriate. Firetide 5100 and 5200 devices are certified to the requirements of RSS-210 for 2.4 GHz spread spectrum devices. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations. For further information, contact your local Industry Canada office. Cet appareil numerique de la classe A respecte les exigences du Reglement sur le material broilleur du Canada. Lartifice pour lopration dans la bande 5150-5250 MHz est seulement pour lutilisation en salle pour rduire le potentiel pour linterfrence malfai-
sante au radiotlphone de co-canal les systmes satellites. laugmentation dantenne maximum permise pour les artifices dans les bandes 5250-5350 MHz et 5470-5725 MHz se pliera la limite de.i.r.p. laugmentation dantenne maximum permise pour les artifices dans la bande 5725-5825 MHz se pliera aux limites de.i.r.p. spcifies pour le point--point et non lopration de point--point comme appropries. Dispositifs Firetide 5100 et 5200 sont certifis selon les exigences du CNR-
210 pour les priphriques 2,4 GHz talement de spectre. Lutilisation de ce dispositif dans un systme dexploitation, partiellement ou complte-
ment lextrieur peut obliger lutilisateur obtenir une licence pour le systme en fonction de la rglementation canadienne. Pour de plus amples renseignements, communiquez avec votre bureau dIndustrie Canada. NCC Statement 40 HotPoint 5000 User Guide January 2011 Appendix E Limited End User Product Warranty Pursuant to all provisions described herein, Firetide hardware products and Firetide antennas are warranted for one (1) year from the date of purchase against defects in the build materi-
als and workmanship. Firetide does not warrant that the Prod-
ucts will meet any requirements or specifications of any End User Customer. This warranty applies to the entire Firetide product, including the AC power adapter. Pursuant to all provisions described herein, Firetide software products are warranted for ninety (90) days from the date of pur-
chase against defects in the build materials and workmanship. Firetide also warrants that the Software will materially conform to the documentation supplied by Firetide with the Software. In the event that the Software fails to materially conform to the documentation and an authorized Firetide reseller is notified in writing of such failure within the warranty period, Firetide or its reseller shall use commercially reasonable efforts to promptly correct the nonconformity. Firetide does not warrant that the use of the Software will be uninterrupted or error free. The above warranties are void if the alleged defect cannot be verified by Firetide or if, as determined by Firetide, the product failure was due to tampering, abuse, misuse, accident, shipping, handling, or storage; or if the product has been installed, used, or maintained in a manner not described in the product user manual; or if the product has been altered in any way; or if prod-
uct serialization has been altered. Any attempt to disassemble or repair the product by anyone other than Firetide immediately voids this warranty. This warranty applies only to the original End User purchaser of the product and may not be transferred to any other individual or entity. The foregoing are the exclusive warranties applicable to the product including the software, and the exclusive remedy for defects in the product. Firetide disclaims all other warran-
ties, whether express, implied, statutory or otherwise, in-
cluding but not limited to implied warranties of merchant-
ability, non-infringement or fitness for a particular purpose. Some laws do not allow the exclusion of implied warranties so to that extent this limitation may not apply to you. In no event will Firetide be liable for any special, incidental, con-
sequential, punitive or indirect damages whatsoever (including, without limitation, damages for loss of profits, business interrup-
tion, loss of information, or other pecuniary loss) arising out of the use or inability to use the product or the performance, inter-
ruption or failure of the product, irrespective of the cause of ac-
tion, even if Firetide has been advised of the possibility of such damages. Firetides cumulative liability for all claims arising out of or in connection with this warranty will not exceed the amount paid by the original End User purchaser to purchase the product. The amounts payable for the product are based in part on these limitations and these limitations shall apply notwithstanding the failure of essential purpose of any remedy. Some jurisdictions do not allow the exclusion or limitation of incidental or consequen-
tial damages, so to that extent the above limitations or exclu-
sions may not apply to you. By using the product the original End User purchaser agrees to and is bound by these terms and conditions. In the event that a product fails to meet this warranty and Firetides authorized reseller is notified in writing of such failure within the warranty period, Firetide shall, at its own discretion, either repair the product or replace it with the same or a func-
tionally-equivalent product free of charge. Replacement products may contain refurbished materials in whole or in part. Firetide will honor this warranty provided the product is returned through an authorized Firetide reseller or dealer with shipping charges prepaid, along with a proof of purchase describing the origi-
nal purchase date and product serial numbers if applicable. The authorized reseller must acquire a Return Materials Authoriza-
tion (RMA) number from Firetide prior to returning any product. Firetide does not accept shipments of defective products without shipping charges prepaid. Please contact your Firetide dealer for instructions on returning defective or damaged products for repair or replacement. Do not return products to Firetide, Inc. Please keep all original packag-
ing materials in the event they are needed to return the product for servicing. January 2011 Firetide - Reliable Connectivity Anywhere 41 Firetide, Inc. 140 Knowles Avenue Los Gatos, CA 95032 USA Copyright Notice: 2010 Firetide, Inc. All rights reserved. Trade-
marks: Firetide, the Firetide logo, Instant Mesh Networks, Hot-
Port, HotPoint, and HotClient are trademarks of Firetide, Inc. All other trademarks are the property of their respective owners.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2011-09-30 | 5660 ~ 5700 | NII - Unlicensed National Information Infrastructure TX | Class II permissive change or modification of presently authorized equipment |
2 | 2011-01-24 | 4950 ~ 4980 | TNB - Licensed Non-Broadcast Station Transmitter | Original Equipment |
3 | 5180 ~ 5240 | NII - Unlicensed National Information Infrastructure TX | ||
4 | 5745 ~ 5825 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 4 | Effective |
2011-09-30
|
||||
1 2 3 4 |
2011-01-24
|
|||||
1 2 3 4 | Applicant's complete, legal business name |
Firetide Inc.
|
||||
1 2 3 4 | FCC Registration Number (FRN) |
0009447566
|
||||
1 2 3 4 | Physical Address |
Firetide Inc.A Division of UNICOM GLOBAL
|
||||
1 2 3 4 |
Campbell, California 950008
|
|||||
1 2 3 4 |
United States
|
|||||
app s | TCB Information | |||||
1 2 3 4 | TCB Application Email Address |
t******@metlabs.com
|
||||
1 2 3 4 | TCB Scope |
B2: General Mobile Radio And Broadcast Services equipment in the following 47 CFR Parts 22 (non-cellular) 73, 74, 90, 95, 97, & 101 (all below 3 GHz)
|
||||
1 2 3 4 |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
|||||
app s | FCC ID | |||||
1 2 3 4 | Grantee Code |
REP
|
||||
1 2 3 4 | Equipment Product Code |
5100-1
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 4 | Name |
S****** H****
|
||||
1 2 3 4 | Title |
CTO
|
||||
1 2 3 4 | Telephone Number |
+1-40********
|
||||
1 2 3 4 | Fax Number |
+1-40********
|
||||
1 2 3 4 |
s******@firetide.com,prasanth@firetide.com
|
|||||
app s | Technical Contact | |||||
1 2 3 4 | Firm Name |
MET Laboratories
|
||||
1 2 3 4 |
Firetide Inc.
|
|||||
1 2 3 4 | Name |
M****** L****
|
||||
1 2 3 4 |
S**** G********
|
|||||
1 2 3 4 | Physical Address |
914 W. Patapsco Ave.
|
||||
1 2 3 4 |
140 Knowles Drive
|
|||||
1 2 3 4 |
Baltimore, Maryland 21234
|
|||||
1 2 3 4 |
Los Gatos, California 95032
|
|||||
1 2 3 4 |
United States
|
|||||
1 2 3 4 | Telephone Number |
408-3********
|
||||
1 2 3 4 | Fax Number |
408-3********
|
||||
1 2 3 4 |
t******@metlabs.com
|
|||||
1 2 3 4 |
s******@firetide.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 3 4 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
1 2 3 4 | Yes | |||||
1 2 3 4 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 4 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 4 | Equipment Class | NII - Unlicensed National Information Infrastructure TX | ||||
1 2 3 4 | TNB - Licensed Non-Broadcast Station Transmitter | |||||
1 2 3 4 | DTS - Digital Transmission System | |||||
1 2 3 4 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Hotpoint 5100 Access Point | ||||
1 2 3 4 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 4 | Modular Equipment Type | Does not apply | ||||
1 2 3 4 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 3 4 | Original Equipment | |||||
1 2 3 4 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 4 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 4 | Grant Comments | Output power is conducted. Operations in 5.15-5.25 GHz and 5.47-5.725 GHz bands are for indoor use only. Device operates with specific antennas in MIMO configurations as described in this filing. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. Users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 2 3 4 | Power output listed is conducted. The antennas used for this device must be fixed-mounted on outdoor permanent structures. Professional installation is required. The antenna(s) must be installed to provide a separation distance of at least 20 cm from all persons, and must not be co-located or operating in conjunction with other antennas or transmitters except as described in this filing. End-users and installers must be provided with transmitter operation conditions for satisfying RF exposure compliance. | |||||
1 2 3 4 | Power listed is the maximum combined conducted output power as indicated in the filing. Device is operating in a 3x3 Spatial Multiplexing MIMO configuration as described in this filing. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter other then described in this filing. OEM integrators must be provided with antenna installation instructions. OEM integrators and end-users must be provided with transmitter operation conditions for satisfying RF exposure compliance. | |||||
1 2 3 4 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 4 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 4 | Firm Name |
MET Laboratories Inc
|
||||
1 2 3 4 | Name |
A******** B********
|
||||
1 2 3 4 | Telephone Number |
510-3********
|
||||
1 2 3 4 |
a******@metlabs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15E | MO | 5260 | 5320 | 0.07157 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15E | MO | 5500 | 5580 | 0.08497 | |||||||||||||||||||||||||||||||||||
1 | 3 | 15E | MO | 5660 | 5700 | 0.08497 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 9 | 4945 | 4985 | 0.377 | 18 ppm | 4M17D7D | ||||||||||||||||||||||||||||||||||
2 | 2 | 9 | 4945 | 4985 | 0.462 | 18 ppm | 8M31D7D | ||||||||||||||||||||||||||||||||||
2 | 3 | 9 | 4950 | 4980 | 0.36 | 18 ppm | 16M56D7 | ||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15E | MO | 5180.00000000 | 5240.00000000 | 0.0476000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15C | MO | 2412 | 2462 | 0.2615 | |||||||||||||||||||||||||||||||||||
4 | 2 | 15C | MO | 5745 | 5825 | 0.6029 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC