
Do you have a question about the Hirschmann BAT54-F and is the answer not in the manual?
| Model | BAT54-F | 
|---|---|
| Type | Wireless Access Point | 
| Frequency Bands | 2.4 GHz, 5 GHz | 
| Wireless Standards | IEEE 802.11a/b/g/n | 
| Maximum Data Rate | 300 Mbps | 
| Ethernet Ports | 2 x 10/100/1000 Mbps | 
| Power over Ethernet (PoE) | IEEE 802.3af | 
| Operating Temperature | -20°C to +60°C | 
| Data Rate | 300 Mbps | 
| Antenna Connectors | 2 x RP-SMA | 
| Housing | Plastic | 
| Protection Class | IP30 | 
| Mounting Options | Wall | 
| Power Supply | PoE | 
Describes the device-independent operating system LCOS, used by BAT routers and Access Points.
Specifies the applicability of the manual to specific firmware versions and models.
Recommends configuring security settings like Firewall, encryption, and access protection.
Provides an abstract overview of BAT interfaces and LCOS modules.
Introduces wireless network technology, applications, and capabilities of BAT Access Points.
Explains IEEE 802.11 standards (802.11a, 802.11b, 802.11g) for radio transmission.
Details various operation modes like ad-hoc, infrastructure, client, and bridge.
Explains WLAN security evolution from WEP to WPA/TKIP and 802.11i/AES standards.
Covers methods to protect wireless networks using encryption, ACLs, and background scanning.
Details WLAN parameter configuration including security, general settings, and interfaces.
Covers parameters for filtering data packets, redirect function, and DHCP address tracking.
Explains basic and advanced configuration for client mode, including roaming settings.
Details antenna alignment, configuration, security, and geometric dimensioning for P2P WLAN connections.
Covers geometrical layout, antenna power, and transmission path considerations for outdoor wireless links.
Explains bandwidth limitations for WLAN clients in access point and client modes.
Discusses WLAN standards including IEEE 802.11h, ETSI standards, and frequency ranges.
Outlines the three access methods (inband, outband, remote) for configuring BAT devices.
Describes configuration software like LANconfig, WEBconfig, SNMP, Telnet, and TFTP.
Explains how to find and configure devices, including serial interface hints and hardware handshake.
Details how to use LANconfig, WEBconfig, Telnet, TFTP, SNMP, and SSH for device configuration.
Explains saving, restoring, and managing device configurations using files.
Guides on updating firmware safely using Hirschmann FirmSafe, including activation modes.
Explains how to reset the device to factory default settings using the Reset button.
Covers setting up administrators, defining access rights, and managing user privileges.
Explains configuring loopback addresses for ICMP polling, time servers, and SYSLOG clients.
Explains how to set the graphical user interface language for LANconfig and LANmonitor.
Details managing devices within projects, including user-specific settings and directory structures.
Explains scripting for automating configuration tasks, including applications and file management.
Guides on creating group configurations using partial configuration files and folders.
Explains the Rollout Wizard for on-site adjustments and configuring variables and actions.
Covers display functions in LANmonitor for monitoring device status, connections, and activities.
Introduces LANmonitor for viewing router status, troubleshooting messages, and monitoring traffic.
Explains WLANmonitor for visualizing WLAN status, searching access points, and detecting rogue devices.
Explains using trace outputs to monitor internal processes and troubleshoot connection errors.
Discusses SYSLOG module for recording accesses and configuring SYSLOG clients.
Explains the ping command for testing network connectivity and its syntax.
Discusses monitoring data traffic between ports and the need to set ports to monitor mode.
Describes using the built-in cable tester to diagnose cabling defects and interpret results.
Covers essential parameters for data exchange security, including password protection and access rights.
Provides an overview of important security functions to ensure comprehensive configuration.
Identifies potential dangers from Internet connections and common attack vectors.
Defines a Firewall and its types, explaining how it checks data packets and ensures network protection.
Details BAT Firewall functions, special protocols, general settings, and rule configuration.
Explains the Intrusion Detection System (IDS) for recognizing, repelling, and logging break-in attempts.
Discusses DoS attacks and protective mechanisms, including SYN Flooding, Smurf, and Ping of Death.
Explains the objective of Quality of Service (QoS) in transferring data packets safely or with minimal delay.
Details methods for signaling preferential data packet treatment using ToS and DiffServ fields.
Explains the queue concept for data packet management in transmission and receiving directions.
Discusses limiting packet length to prioritize time-critical connections and compensate for performance issues.
Covers QoS configuration for VoIP, influencing voice quality through delay, packet loss, and jitter.
Guides on configuring QoS by evaluating ToS/DiffServ fields, defining bandwidth, and adjusting transfer rates.
Defines Virtual LANs (VLANs) for segmenting large LANs using switches, improving bandwidth and administration.
Explains VLAN goals like shielding traffic and reducing broadcast traffic to logical units using frame tagging.
Outlines tasks for configuring BAT Router VLANs, including defining virtual LANs and interface handling.
Explains setting the Ethernet2 type of VLAN tag ('tag value') for provider networks using special VLAN tagging IDs.
Details assigning different VLAN IDs to WLAN users via MAC addresses in the Access List.
Describes VLAN tags on layer 2/3, their priority, and processing based on packet direction.
Explains using VLAN tags for DSL networks to differentiate logical networks on shared transmission media.
Details VLAN Q-in-Q tagging for connecting multiple networks sharing a physical medium.
Covers WAN connection applications, protocols used, and close cooperation with router modules.
Explains IP router functionality between networks and the structure of the IP routing table.
Details configuring remote stations using peer lists and layer lists, including switching off SYN/ACK speedup.
Explains IP masquerading for connecting LAN computers to the Internet, hiding internal IP addresses.
Defines DMZ as a network segment accessible from the Internet for offering services, shielded by a firewall.
Introduces Advanced Routing and Forwarding (ARF) for flexible definition of IP networks and interface assignments.
Details various network services like DHCP, NetBIOS proxy, RIP, PPPoE servers, and load balancing.
Discusses combining multiple DSL connections to overcome communication bottlenecks.
Explains Network Address Translation (NAT) for coupling networks with identical address ranges and resolving conflicts.
Introduces the Point-to-Point Protocol (PPP) and its functions like password protection and callback.
Details DSL dial-in over PPTP, building tunnels, and configuration parameters.
Explains the Keep-alive function for maintaining connections, especially with flat rates.
Covers automatic callback via ISDN port, including Microsoft CBCP and PPP LCP extensions.
Discusses serial interfaces for modem operation, system requirements, and installation.
Explains manually defining MTU for remote sites to avoid data transfer speed problems due to packet fragmentation.
Covers entering remote stations into the WAN RIP table for broadcasting routes across the WAN.
Discusses STP and RSTP for intelligent path selection, loop avoidance, and configuring the protocol.
Explains DHCP for dynamically assigning IP addresses, DNS, and gateway information to network devices.
Explains the Domain Name Service (DNS) for associating names with IP addresses and filtering domain requests.
Covers saving connection information and accounting data in snapshots for later evaluation.
Discusses the SYSLOG module for recording accesses and keeping a history of activities.
Explains how BAT routers apply time information from NTP servers or ISDN for local network stations.
Introduces scheduled events for executing predefined commands at user-defined times.
Explains PPPoE clients and servers for managing network access rights and services.
Explains RADIUS as a triple-A protocol for authentication, authorization, and accounting of network access.
Discusses RADIUS server extensions, including new authentication methods and RADIUS forwarding.
Explains RADSEC as a secure protocol for RADIUS using TLS-encrypted tunnels.
Lists general and VPN error messages encountered in LANmonitor for troubleshooting.
Details SNMP traps, including MIB2 traps, enterprise-specific traps, and WLAN traps.
Provides information on radio channels and frequency ranges for 2.4 GHz and 5 GHz bands.
Lists supported RFCs related to network protocols like Routing Information Protocol, PPP, and IPsec.
Provides a glossary of terms related to wireless LAN, networking, and protocols.