Accton Wireless Broand NW181RG25021W 802.11bgn 1T1R Module User Manual user guide

Accton Wireless Broadband Corp. 802.11bgn 1T1R Module user guide

User Manual

USER GUIDE802.11bgn 1T1R ModuleRG231-W1T1R Module
USER GUIDERG231-W1T1R MODULEIEEE 802.11/b/g/n Module,RG231-W1T1RE122009-CS-R01XXXXXXXXXXXXX
–  3  –COMPLIANCESFEDERAL COMMUNICATION COMMISSION INTERFERENCE STATEMENTThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:◆Reorient or relocate the receiving antenna.◆Increase the separation between the equipment and receiver.◆Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.◆Consult the dealer or an experienced radio/TV technician for help.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.IMPORTANT NOTE: FCC RADIATION EXPOSURE STATEMENT:This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
COMPLIANCES–  4  –This device is intended only for OEM integrators under the following conditions:1. The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2. The transmitter module may not be co-located with any other transmitter or antenna, 3. For all products market in US, OEM has to limit the operation channels in CH1 to CH11 for 2.4G band by supplied firmware programming tool. OEM shall not supply any tool or info to the end-user regarding to Regulatory Domain change.As long as 3 conditions above are met, further transmitter test will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.).IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization.END PRODUCT LABELINGThis transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained between the antenna and users. The final end product must be labeled in a visible area with the following: "Contains FCC ID: V8YNW181RG25021W".MANUAL INFORMATION TO THE END USERThe OEM integrator has to be aware not to provide information to the end user regarding how to install or remove this RF module in the user's manual of the end product which integrates this module.The end user manual shall include all required regulatory information/warning as show in this manual.EC CONFORMANCE DECLARATION Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards:◆EN 60950-1 (IEC 60950-1) - Product Safety◆EN 301 489-1, EN 301 489-4, EN 302 326-2 (V1.2.2), EN 302 326-3 (V1.2.2) - EMC requirements for radio equipment 0560
COMPLIANCES–  5  –This device is intended for use in all European Community countries. NCC 警語 本模組於取得認證後將依規定於模組本體標示審合格籤,並要求平台上標示「本產品內含射頻模組:ID 編號」
–  6  –CONTENTSCOMPLIANCES 3CONTENTS 61WI-FI SETTINGS 7Basic Wireless Settings  8Advanced Wireless Settings  10Wireless Security  12Wired Equivalent Privacy (WEP)  13WPA Pre-Shared Key  14WPA Enterprise Mode  15IEEE 802.1X and RADIUS  16ACL Settings  17AHARDWARE SPECIFICATIONS 19
–  7  –1WI-FI SETTINGSThe RG231 model for the 3.5 GHz WiMAX band includes an IEEE 802.11n radio interface for local Wi-Fi communications. The Wi-Fi set up pages include configuration options for the radio signal characteristics and Wi-Fi security. The Wi-Fi configuration pages include the following options.Table 1: Wi-Fi SettingsMenu Description PageBasic Allows you configure basic radio parameters. 8Advanced Allows you configure advanced radio parameters. 10Security Configures Wi-Fi security features. 12ACL Configures a client MAC address control list. 17
CHAPTER 1  |  Wi-Fi SettingsBasic Wireless Settings–  8  –BASIC WIRELESS SETTINGSFrom the WiFi menu, click on Basic to configure basic settings for the unit’s Wi-Fi radio interface. The unit’s radio can operate in six modes, IEEE 802.11b/g mixed, 802.11b only, 802.11g only, 802.11n only, 802.11g/n mixed, and 802.11b/g/n mixed.Note that IEEE 802.11g is backward compatible with 802.11b, and 802.11n is backward compatible with 802.11b/g at slower data transmit rates.Figure 1:  Wireless SettingsThe following items are displayed on this page:◆Radio Enable — Enables or Disable the radio. (Default: Enable)◆Network Mode — Defines the radio operating mode. (Default: 11g/n Mixed)■11b/g mixed: Both 802.11b and 802.11g clients can communicate with the Wi-Fi radio (up to 108 Mbps), but data transmission rates may be slowed to compensate for 802.11b clients. Any 802.11n clients will also be able to communicate with the Wi-Fi radio, but they will be limited to 802.11g protocols and data transmission rates.■11b only: All 802.11b, 802.11g, and 802.11n clients will be able to communicate with the Wi-Fi radio, but the 802.11g and 802.11n clients will be limited to 802.11b protocols and data transmission rates (up to 11 Mbps).■11g only: Both 802.11g and 802.11n clients will be able to communicate with the Wi-Fi radio, but the 802.11n clients will be limited to 802.11g protocols and data transmission rates (up to 54 Mbps). Any 802.11b clients will not be able to communicate with the Wi-Fi radio.■11n only: Only 802.11n clients will be able to communicate with the Wi-Fi radio (up to 150 Mbps).■11g/n mixed: Both 802.11g and 802.11n clients can communicate with the Wi-Fi radio (up to 150 Mbps), but data transmission rates may be slowed to compensate for 802.11g clients.
CHAPTER 1  |  Wi-Fi SettingsBasic Wireless Settings–  9  –■11b/g/n Mixed: All 802.11b/g/n clients can communicate with the Wi-Fi radio (up to 150 Mbps), but data transmission rates may be slowed to compensate for 802.11b/g clients.◆SSID — The name of the wireless network service provided by the Wi-Fi radio. Clients that want to connect to the network must set their SSID to the same as that of the Wi-Fi radio. (Default: “SMC”; Range: 1-32 characters)◆Hidden — By default, the Wi-Fi radio always broadcasts the SSID in its beacon signal. Disabling the SSID broadcast increases security of the network because wireless clients need to already know the SSID before attempting to connect. (Default: Enabled)◆Country Code — The country code restricts operation of the Wi-Fi radio to the channels and transmit power levels permitted for Wi-Fi networks in the specified region. You must set the correct Country Code to be sure the radio conforms to local regulations. (Options: United States, Japan, France, Taiwan, Ireland; Default: Taiwan) NOTE: The Country Code setting is for non-US models only. The US model does not include this setting.CAUTION: You must set the country code to the country of operation. Setting the country code restricts operation of the access point to the radio channels and transmit power levels permitted for wireless networks in the specified country.◆Channel — The radio channel that the Wi-Fi radio uses to communicate with wireless clients. When multiple access points are deployed in the same area, set the channel on neighboring access points at least five channels apart to avoid interference with each other. For example, you can deploy up to three access points in the same area using channels 1, 6, 11. Note that wireless clients automatically set the channel to the same as that used by the Wi-Fi radio to which it is linked. Selecting Auto Select enables the Wi-Fi radio to automatically select an unoccupied radio channel. (Default: Auto)NOTE: If you experience poor performance, you may be encountering interference from another wireless device. Try changing the channel, as this may eliminate interference and increase performance. Channels 1, 6, and 11, as the three non-overlapping channels in the 2.4 GHz band, are preferred.◆Channel Width — The Wi-Fi radio provides a channel bandwidth of 40 MHz by default giving an 802.11g connection speed of 108 Mbps (sometimes referred to as Turbo Mode) and a 802.11n connection speed of up to 150 Mbps. Setting the Channel Width to 20 MHz slows connection speed for 802.11g and 802.11n to 54 Mbps and 74 Mbps
CHAPTER 1  |  Wi-Fi SettingsAdvanced Wireless Settings–  10  –respectively and ensures backward compliance for slower 802.11b devices. (Default: 20MHz)ADVANCED WIRELESS SETTINGSThe Advanced Settings page includes additional parameters concerning the wireless network and Wi-Fi Multimedia settings.Figure 2:  Advanced Wireless SettingsThe following items are displayed on this page:◆BG Protection Mode — Enables a backward compatible protection mechanism for 802.11b clients. There are three modes: (Default: Auto)■Auto — The unit enables its protection mechanism for 802.11b clients when they are detected in the network. When 802.11b clients are not detected, the protection mechanism is disabled.■On — Forces the unit to always use protection for 802.11b clients, whether they are detected in the network or not. Note that enabling b/g Protection can slow throughput for 802.11g/n clients by as much as 50%.■Off — Forces the unit to never use protection for 802.11b clients. This prevents 802.11b clients from connecting to the network.◆Beacon Period — The rate at which beacon signals are transmitted from the access point. The beacon signals allow wireless clients to maintain contact with the access point. They may also carry power-management information. (Range: 20-999 TUs; Default: 100 TUs)◆DTIM Period — The rate at which stations in sleep mode must wake up to receive broadcast/multicast transmissions. Known also as the Delivery Traffic Indication Map (DTIM) interval, it indicates how often the MAC layer forwards broadcast/multicast traffic, which is necessary to wake up stations that are using Power Save mode. The default value of one beacon indicates that the access point will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after every beacon. Using smaller DTIM intervals
CHAPTER 1  |  Wi-Fi SettingsAdvanced Wireless Settings–  11  –delivers broadcast/multicast frames in a more timely manner, causing stations in Power Save mode to wake up more often and drain power faster. Using higher DTIM values reduces the power used by stations in Power Save mode, but delays the transmission of broadcast/multicast frames. (Range: 1-255 beacons; Default: 1 beacon)◆Frag Threshold – Configures the minimum packet size that can be fragmented when passing through the access point. Fragmentation of the PDUs (Package Data Unit) can increase the reliability of transmissions because it increases the probability of a successful transmission due to smaller frame size. If there is significant interference present, or collisions due to high network utilization, try setting the fragment size to send smaller fragments. This will speed up the retransmission of smaller frames. However, it is more efficient to set the fragment size larger if very little or no interference is present because it requires overhead to send multiple frames. (Range: 256-2346 bytes; Default: 2346 bytes)◆RTS Threshold — Sets the packet size threshold at which a Request to Send (RTS) signal must be sent to a receiving station prior to the sending station starting communications. The access point sends RTS frames to a receiving station to negotiate the sending of a data frame. After receiving an RTS frame, the station sends a CTS (clear to send) frame to notify the sending station that it can start sending data.If the RTS threshold is set to 0, the access point always sends RTS signals. If set to 2347, the access point never sends RTS signals. If set to any other value, and the packet size equals or exceeds the RTS threshold, the RTS/CTS (Request to Send / Clear to Send) mechanism will be enabled.The access points contending for the medium may not be aware of each other. The RTS/CTS mechanism can solve this “Hidden Node Problem.” (Range: 1-2347 bytes: Default: 2347 bytes)◆TX Power – Adjusts the power of the radio signals transmitted from the unit. The higher the transmission power, the farther the transmission range. Power selection is not just a trade off between coverage area and maximum supported clients. You also have to ensure that high-power signals do not interfere with the operation of other radio devices in the service area. (Range: 1 - 100; Default: 100)◆Short Slot — Sets the basic unit of time the access point uses for calculating waiting times before data is transmitted. A short slot time (9 microseconds) can increase data throughput on the access point, but requires that all clients can support a short slot time (that is, 802.11g-compliant clients must support a short slot time). A long slot time (20 microseconds) is required if the access point has to support 802.11b clients. (Default: Enabled)◆TX Burst — A performance enhancement that transmits a number of data packets at the same time when the feature is supported by compatible clients. (Default: Enabled)
CHAPTER 1  |  Wi-Fi SettingsWireless Security–  12  –◆Pkt Aggregate — A performance enhancement that combines data packets together when the feature is supported by compatible clients. (Default: Enabled)WIRELESS SECURITYThe RG231’s Wi-Fi interface is configured by default as an “open system,” which broadcasts a beacon signal including the configured SSID. Wireless clients with a configured SSID of “ANY” can read the SSID from the beacon, and automatically set their SSID to allow immediate connection to the wireless network.To implement wireless network security, you have to employ two main functions:◆Authentication – It must be verified that clients attempting to connect to the network are authorized users.◆Traffic Encryption – Data passing between the unit and clients must be protected from interception and evesdropping.The RG231’s Wi-Fi interface supports supports ten different security mechanisms that provide various levels of authentication and encryption depending on the requirements of the network.Click on “Wi-Fi,” followed by “Security”.Figure 3:  Security Mode OptionsThe supported security mechanisms and their configuration parameters are described in the following sections:◆OPEN, SHARED, WEP-AUTO — See “Wired Equivalent Privacy (WEP)” on page 13◆WPA-PSK, WPA2-PSK, WPA-PSK_WPA2-PSK — See “WPA Pre-Shared Key” on page 14◆WPA, WPA2, WPA1_WPA2 — See “WPA Enterprise Mode” on page 15◆802.1X — See “IEEE 802.1X and RADIUS” on page 16
CHAPTER 1  |  Wi-Fi SettingsWireless Security–  13  –WIRED EQUIVALENTPRIVACY (WEP)WEP provides a basic level of security, preventing unauthorized access to the network, and encrypting data transmitted between wireless clients and an access point. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network.When you select to use WEP, be sure to define at least one static WEP key for user authentication or data encryption. Also, be sure that the WEP shared keys are the same for each client in the wireless network.Figure 4:  Security Mode - WEPThe following items are displayed in this section on this page:◆Auth Mode — Configures the WEP security mode used by clients. When using WEP, be sure to define at least one static WEP key for the RG231 and all its clients. (Default: Disable)◆OPEN — Open-system authentication accepts any client attempting to connect the RG231 without verifying its identity. In this mode the default data encryption type is “WEP.” ◆SHARED — The shared-key security uses a WEP key to authenticate clients connecting to the network and for data encryption. ◆WEP-AUTO — Allows wireless clients to connect to the network using Open-WEP (uses WEP for encryption only) or Shared-WEP (uses WEP for authentication and encryption). ◆Encrypt Type — Selects WEP for data encryption (OPEN mode only).◆Default Key — Selects the WEP key number to use for authentication or data encryption. If wireless clients have all four WEP keys configured to the same values, you can change the encryption key to any of the settings without having to update the client keys. (Default: 1; Range: 1~4)◆WEP Keys 1 ~ 4 — Sets WEP key values. The user must first select ASCII or hexadecimal keys. Each WEP key has an index number. Enter key values that match the key type and length settings. Enter 5 alphanumeric characters or 10 hexadecimal digits for 64-bit keys, or
CHAPTER 1  |  Wi-Fi SettingsWireless Security–  14  –enter 13 alphanumeric characters or 26 hexadecimal digits for 128-bit keys. (Default: Hex, no preset value)WPA PRE-SHAREDKEYWi-Fi Protected Access (WPA) was introduced as an interim solution for the vulnerability of WEP pending the adoption of a more robust wireless security standard. WPA2 includes the complete wireless security standard, but also offers backward compatibility with WPA. Both WPA and WPA2 provide an “enterprise” and “personal” mode of operation.For small home or office networks, WPA and WPA2 provide a simple “personal” operating mode that uses just a pre-shared key for network access. The WPA Pre-Shared Key (WPA-PSK) mode uses a common password phrase for user authentication that is manually entered on the access point and all wireless clients. Data encryption keys are automatically generated by the access point and distributed to all clients connected to the network.Figure 5:  Security Mode - WPA-PSKThe following items are displayed in this section on this page:◆Auth Mode — Configures the WPA-PSK and WPA2-PSK security modes used by clients. When using WPA-PSK or WPA2-PSK, be sure to define the shared key for the RG231 and all its clients. (Default: Disable)◆WPA-PSK — Clients using WPA with a Pre-shared Key are accepted for authentication. The default data encryption type for WPA is TKIP.◆WPA2-PSK — Clients using WPA2 with a Pre-shared Key are accepted for authentication. The default data encryption type for WPA is AES.◆WPA-PSK_WPA2-PSK — Clients using WPA or WPA2 with a Pre-shared Key are accepted for authentication. The default data encryption type is TKIP/AES.◆EncryptType — Selects the data encryption type to use. (Default is determined by the Security Mode selected.)■TKIP — Uses Temporal Key Integrity Protocol (TKIP) keys for encryption. WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys.■AES — Uses Advanced Encryption Standard (AES) keys for encryption. WPA2 uses AES Counter-Mode encryption with Cipher Block Chaining Message Authentication Code (CBC-MAC) for
CHAPTER 1  |  Wi-Fi SettingsWireless Security–  15  –message integrity. The AES Counter-Mode/CBCMAC Protocol (AES-CCMP) provides extremely robust data confidentiality using a 128-bit key. Use of AES-CCMP encryption is specified as a standard requirement for WPA2. Before implementing WPA2 in the network, be sure client devices are upgraded to WPA2-compliant hardware.■TKIP/AES — Uses either TKIP or AES keys for encryption. WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID. In mixed mode, the unicast encryption type (TKIP or AES) is negotiated for each client.◆Pass Phrase — The WPA Preshared Key can be input as an ASCII string (an easy-to-remember form of letters and numbers that can include spaces) or Hexadecimal format. (Range: 8~63 ASCII characters, or exactly 64 Hexadecimal digits)WPA ENTERPRISEMODEWi-Fi Protected Access (WPA) was introduced as an interim solution for the vulnerability of WEP pending the adoption of a more robust wireless security standard. WPA2 includes the complete wireless security standard, but also offers backward compatibility with WPA. Both WPA and WPA2 provide an “enterprise” and “personal” mode of operation.For enterprise deployment, WPA and WPA2 use IEEE 802.1X for user authentication and require a RADIUS authentication server to be configured on the wired network. Data encryption keys are automatically generated and distributed to all clients connected to the network.Figure 6:  Security Mode - WPAThe following items are displayed in this section on this page:◆Auth Mode — Configures the WPA and WPA2 security modes used by clients. When using WPA or WPA2, be sure there is a RADIUS server in the connected wired network, and that the RADIUS settings are configured. See “IEEE 802.1X and RADIUS” on page 16 for more information. (Default: Disable)◆WPA — Clients using WPA with an 802.1X authentication method are accepted for authentication. The default data encryption type for WPA is TKIP.◆WPA2 — Clients using WPA2 with an 802.1X authentication method are accepted for authentication. The default data encryption type for WPA is AES.
CHAPTER 1  |  Wi-Fi SettingsWireless Security–  16  –◆WPA1_WPA2 — Clients using WPA or WPA2 with an 802.1X authentication method are accepted for authentication. The default data encryption type is TKIP/AES.◆EncryptType — Selects the data encryption type to use. (Default is determined by the Security Mode selected.)■TKIP — Uses Temporal Key Integrity Protocol (TKIP) keys for encryption. WPA specifies TKIP as the data encryption method to replace WEP. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys.■AES — Uses Advanced Encryption Standard (AES) keys for encryption. WPA2 uses AES Counter-Mode encryption with Cipher Block Chaining Message Authentication Code (CBC-MAC) for message integrity. The AES Counter-Mode/CBCMAC Protocol (AES-CCMP) provides extremely robust data confidentiality using a 128-bit key. Use of AES-CCMP encryption is specified as a standard requirement for WPA2. Before implementing WPA2 in the network, be sure client devices are upgraded to WPA2-compliant hardware.■TKIP/AES — Uses either TKIP or AES keys for encryption. WPA and WPA2 mixed modes allow both WPA and WPA2 clients to associate to a common SSID. In mixed mode, the unicast encryption type (TKIP or AES) is negotiated for each client.IEEE 802.1X ANDRADIUSIEEE 802.1X is a standard framework for network access control that uses a central RADIUS server for user authentication. This control feature prevents unauthorized access to the network by requiring an 802.1X client application to submit user credentials for authentication. The 802.1X standard uses the Extensible Authentication Protocol (EAP) to pass user credentials (either digital certificates, user names and passwords, or other) from the client to the RADIUS server. Client authentication is then verified on the RADIUS server before the client can access the network.Remote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a central server to control access to RADIUS-aware devices on the network. An authentication server contains a database of user credentials for each user that requires access to the network.The WPA and WPA2 enterprise security modes use 802.1X as the method of user authentication. IEEE 802.1X can also be enabled on its own as a security mode for user authentication. When 802.1X is used, a RADIUS server must be configured and be available on the connected wired network.NOTE: This guide assumes that you have already configured RADIUS server(s) to support the access point. Configuration of RADIUS server software is beyond the scope of this guide, refer to the documentation provided with the RADIUS server software.
CHAPTER 1  |  Wi-Fi SettingsACL Settings–  17  –Figure 7:  Security Mode - 802.1XThe following items are displayed in this section on this page:◆Auth Mode — Configures the 802.1X security mode used by clients. When using 802.1X, either with WPA/WPA2 or on its own, be sure there is a configured RADIUS server in the connected wired network. (Default: Disable)◆RADIUS Server — Specifies the IP address of the RADIUS server.◆RADIUS Port — The User Datagram Protocol (UDP) port number used by the RADIUS server for authentication messages. (Range: 1024-65535;  Default: 1812)◆RADIUS Key — A shared text string used to encrypt messages between the access point and the RADIUS server. Be sure that the same text string is specified on the RADIUS server. Do not use blank spaces in the string. (Maximum length: 20 characters)ACL SETTINGSWireless clients can be authenticated for network access by checking their MAC address against a local database configured on the RG231. You can configure a list of up to 32 wireless client MAC addresses in the filter list to  allow network access.Figure 8:  ACL Settings
CHAPTER 1  |  Wi-Fi SettingsACL Settings–  18  –The following items are displayed on this page:◆MAC Address — Physical address of a client. Enter six pairs of hexadecimal digits separated by colons; for example, 00:90:D1:12:AB:89.◆Add — Click to list a new specified MAC address in the MAC Authentication Table. ◆Operation — Click the Remove button to delete the specified MAC address from the table.
–  19  –AHARDWARE SPECIFICATIONSMODULATION TYPE DSSS / OFDM / OFDM-SISODATA RATES 802.11b: 11 / 5.5 / 2 / 1 Mbps802.11g: 54 / 48 / 36 / 24 / 18 / 12 / 9 / 6 MbpsDraft 802.11n (20MHz, 800ns GI): 65 / 58.5 / 52 / 39 / 26 / 19.5 / 13 / 6.5 MbpsDraft 802.11n (40MHz, 800ns GI): 135 / 121.5 / 108 / 81 / 54 / 40.5 / 27 / 13.5 MbpsDraft 802.11n (20MHz, 400ns GI): 72.2 / 65 / 57.8 / 43.3 / 28.9 / 21.7 / 14.4 / 7.2 MbpsDraft 802.11n (40MHz, 400ns GI): 150 / 135 / 120 / 90 / 60 / 45 / 30 / 15 Mbps FREQUENCY RANGE 2412MHz ~ 2462 MHzNUMBER OF CHANNELS 802.11b, 802.11g, 802.11n (20MHz): 11802.11n (40MHz) : 7RF OUTPUT POWER 802.11b: 21.3dBm802.11g: 24.1dBmDraft 802.11n (20MHz): 22.7dBmDraft 802.11n (40MHz): 23.9dBmOPERATINGTEMPERATURE-5 to 45 °C (23 to 113 °F)POWER RATING DC 5V from host equipmentANTENNA INFORMATION Type: Printed PCBPeak Gain: 2.65 dBi
RG231-W1T1RE122009-CS-R01**************

Navigation menu