Cisco Aironet 1840 Series Access Points
Communications, Services, and Additional Information
First Published: October 28, 2019
Last Updated: August 3, 2022
About the Cisco Aironet 1840 Series Wireless Access Point
AP Views, Ports, and Connectors
Preparing the AP for Installation
Performing a Pre-Installation Configuration
Configuring and Deploying the Access Point
Checking the Access Point LEDs
Miscellaneous Usage and Configuration Guidelines
Declarations of Conformity and Regulatory Information
17 Communications, Services, and Additional Information
This guide provides instructions on how to install your Cisco Aironet 1840 series access point and provides links to resources that can help you configure it. This guide also provides mounting instructions and troubleshooting information.
Note that the 1840 series access point is referred to as the access point or the AP in this document.
The Cisco Aironet 1840 series wireless access point is an 802.11 a/b/g/n/ac (Wave 2) access point with internal antennas. This access point can be mounted on a wall or a ceiling and supports 2x2 2.4 GHz 802.11b/g/n MIMO and 4x4 5 GHz 802.11a/n/ac (Wave 2) MIMO applications simultaneously.
A full listing of the access point's features and specifications are provided in the Cisco Aironet 1840 Series Access Point Data Sheet, at the following URL:
https://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1840-series-access-points/datasheet-c78-742125.html
The 1840 series wireless AP supports:
■5 GHz radio with 4TX x 4RX 802.11ac (Wave 2) with four spatial streams SU-MIMO and three spatial streams MU-MIMO
■2.4 GHz radio with 2TX x 2RX and two spatial streams SU-MIMO
■2.4GHz and 5GHz concurrent radios
■One 5G single-band and three dual-band internal antennas, omni directional in azimuth for both 2.4 GHz (peak gain 4 dBi) and 5 GHz (peak gain 5 dBi)
■The following hardware external interfaces:
–2 x 10/100/1000BASE-T autosensing (RJ-45), Power over Ethernet (PoE)
–RS-232 management console port (RJ-45)
Note The AP may face issues while booting if you use an unterminated console cable (not plugged into any device or terminal) or a console cable that is more than one meter in length.
–USB 2.0 (enabled via future software)
–Recovery push button (enables partial or full system configuration recovery)
–One multi-color LED Status indicator. see the Checking the Access Point LEDs for information on the colors of the LED status indicator.
■Integrated BLE 4.2 radio to enable IoT use cases such as location tracking.
■802.11n and 802.11ac Tx beam forming
■802.11 dynamic frequency selection (DFS)
■Cyclic shift diversity (CSD) support
■Cisco Digital Network Architecture (DNA) support enables Cisco Connected Mobile Experiences, Apple FastLane and Cisco Identity Services Engine.
The AP supports both Cisco Mobility Express and lightweight deployments (using Cisco Wireless controllers). The AP also supports the following operating modes:
■Local—This is the default mode for the Cisco AP. In this mode, the AP does not serve clients.
■Flexconnect—Flexconnect mode for the Cisco AP.
■Monitor—This is the monitor-only mode for the Cisco AP.
■Sniffer—In the wireless sniffer mode, the AP starts sniffing the air on a given channel. It captures and forwards all the packets from the clients on that channel to a remote machine that runs Airopeek or Wireshark (packet analyzers for IEEE 802.11 wireless LANs). This includes information on the time stamp, signal strength, packet size, etc.
Note In the sniffer mode, the server to which the data is sent should be on the same VLAN as the wireless controller management VLAN otherwise an error will be displayed.
Access Point for indoor environments, with internal antennas |
||
Dual-band, 802.11a/b/g/n/ac, factory-shipped with a Cisco Mobility Express software image |
The ‘x’ in the model numbers represents the regulatory domain. You need to verify whether the AP model you have is approved for use in your country. To verify approval and to identify the regulatory domain that corresponds to a particular country, visit http://www.cisco.com/go/aironet/compliance. Not all regulatory domains have been approved. As and when they are approved, this compliance list will be updated.
Translated versions of the following safety warnings are provided in the translated safety warnings document that is shipped with your access point. The translated warnings are also in the Translated Safety Warnings for Cisco Aironet Access Points, which is available on Cisco.com.
To unpack the access point, follow these steps:
–Mounting bracket (AIR-AP-BRACKET-8=, selected when you ordered the access point)
–Adjustable ceiling-rail clip (selected when you ordered the access point)
–Power Injector AIR-PWRINJ6= (only if selected when you ordered the access point).
Before you mount and deploy your access point, we recommend that you perform a site survey (or use the site planning tool) to determine the best location to install your access point.
You should have the following information about your wireless network available:
■Access point mounting options: on or above a suspended ceiling or on a hard ceiling or wall.
Note You can mount the access point above a suspended ceiling but you must purchase additional mounting hardware: See Mounting the Access Point for additional information.
–Cisco power injector, AIR-PWRINJ5= (supports 802.3af only) or AIR-PWRINJ6=
–802.3at PoE+, Cisco Universal PoE (Cisco UPOE®)
Note When 802.3af PoE is the source of power, then USB port will be off.
■Operating temperature: 32°—122°F (0°—50°C)
Note When ambient operating temperature exceeds 40°C, then the radio transmit duty cycle may be limited to 50% or less.
■Operating humidity: 10% to 90% (non-condensing)
■Operating altitude test: 40°C, 9843 ft
Cisco recommends that you make a site map showing access point locations so that you can record the device MAC addresses from each location and return them to the person who is planning or managing your wireless network.
Installing the access point involves these operations:
The following procedures ensure that your access point installation and initial operation go as expected. This procedure is optional.
Note Performing a pre-installation configuration is an optional procedure. If your network controller is properly configured, you can install your access point in its final location and connect it to the network from there. See the Deploying the Access Point on the Wireless Network for details.
The pre-installation configuration setup is illustrated in Pre-Installation Configuration Setup.
To perform pre-installation configuration, perform the following steps:
Note A Wave 2 Cisco AP will be assigned an IP address from the DHCP server only if a default router (gateway) is configured on the DHCP server (enabling the AP to receive its gateway IP address) and the gateway ARP is resolved.
This is not applicable to Wave 1 Cisco APs.
Note The access point requires a gigabit Ethernet (GbE) link to prevent the Ethernet port from becoming a bottleneck for traffic because wireless traffic speeds exceed transmit speeds of a 10/100 Ethernet port.
Note If the access point remains in this mode for more than five minutes, the access point is unable to find the Master Cisco wireless LAN controller. Check the connection between the access point and the Cisco wireless LAN controller and be sure that they are on the same subnet.
Cisco Aironet 1840 series access points can be mounted in several configurations – on or above a suspended ceiling or on a hard ceiling or wall.
For access point mounting instructions, go to the following URL:
http://www.cisco.com/c/en/us/td/docs/wireless/access_point/mounting/guide/apmount.html
The standard mounting hardware supported by the AP is listed in Brackets and Clips for Mounting the AP.
Mounting bracket for ceiling and wall. See AIR-AP-BRACKET-8. |
||
Ceiling Grid Clip (Recessed mounting) |
||
The AP can be powered only through Power-over-Ethernet (PoE) using the following:
■802.3af Cisco power injector, AIR-PWRINJ5=
■802.3at Cisco power injector, AIR-PWRINJ6=
■Any 802.3at (25.5 W) compliant switch port
■802.3at PoE+, Cisco Universal PoE (Cisco UPOE®)
Note When 802.3af PoE is the source of power, then USB port will be off.
This section describes how to connect the access point to a wireless controller. Because the configuration process takes place on the controller, see the Cisco Wireless Controller Configuration Guide for additional information.
The information in this section does not include configuring Link Aggregation. For information on configuring Link Aggregation, see the Cisco Wireless Controller Configuration Guide, Release 8.9, at the following URL:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-9/configuration-guide/b_cg89.html
The access point uses standard Control and Provisioning of Wireless Access Points Protocol (CAPWAP) to communicate between the controller and other wireless access points on the network. CAPWAP is a standard, inter-operable protocol which enables an access controller to manage a collection of wireless termination points. The discovery process using CAPWAP is identical to the Lightweight Access Point Protocol (LWAPP) used with previous Cisco Aironet access points. LWAPP-enabled access points are compatible with CAPWAP, and conversion to a CAPWAP controller is seamless. Deployments can combine CAPWAP and LWAPP software on the controllers.
The functionality provided by the controller does not change except for customers who have Layer 2 deployments, which CAPWAP does not support.
In a CAPWAP environment, a wireless access point discovers a controller by using CAPWAP discovery mechanisms and then sends it a CAPWAP join request. The controller sends the access point a CAPWAP join response allowing the access point to join the controller. When the access point joins the controller, the controller manages its configuration, firmware, control transactions, and data transactions.
Note For additional information about the discovery process and CAPWAP, see the Cisco Wireless Controller Software Configuration Guide. This document is available on Cisco.com.
Note CAPWAP support is provided in controller software release 5.2 or later. However, your controller must be running the release that supports 1840 series access points, as specified in the access point data sheet.
Note You cannot edit or query any access point using the controller CLI if the name of the access point contains a space.
Note Make sure that the controller is set to the current time. If the controller is set to a time that has already occurred, the access point might not join the controller because its certificate may not be valid for that time.
Access points must be discovered by a controller before they can become an active part of the network. The access point supports these controller discovery processes:
■Layer 3 CAPWAP discovery—Can occur on different subnets than the access point and uses IP addresses and UDP packets rather than MAC addresses used by Layer 2 discovery.
■Locally stored controller IP address discovery—If the access point was previously joined to a controller, the IP addresses of the primary, secondary, and tertiary controllers are stored in the access point non-volatile memory. This process of storing controller IP addresses on an access point for later deployment is called priming the access point. For more information about priming, see the Performing a Pre-Installation Configuration.
■DHCP server discovery—This feature uses DHCP option 43 to provide controller IP addresses to the access points. Cisco switches support a DHCP server option that is typically used for this capability. For more information about DHCP option 43, see the Configuring DHCP Option 43.
■DNS discovery—The access point can discover controllers through your domain name server (DNS). For the access point to do so, you must configure your DNS to return controller IP addresses in response to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name. Configuring the CISCO-CAPWAP-CONTROLLER provides backwards compatibility in an existing customer deployment. When an access point receives an IP address and DNS information from a DHCP server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS sends a list of controller IP addresses, the access point sends discovery requests to the controllers.
After you have mounted the access point, follow these steps to deploy it on the wireless network:
The location of the access point status LED is shown in Ports and Connectors on the Head of the A P.
Note Regarding LED status colors, it is expected that there will be small variations in color intensity and hue from unit to unit. This is within the normal range of the LED manufacturer’s specifications and is not a defect.
The access point status LED indicates various conditions which are described in LED Status Indications.
Using the Mode button (see Ports and Connectors on the Head of the A P) you can:
■Reset the AP to the default factory-shipped configuration
■Clear the AP internal storage including all configuration files
To use the mode button, press, and keep pressed, the mode button on the access point during the AP boot cycle. Wait until the AP status LED changes to Amber. During this, the AP console shows a seconds counter, counting the number of seconds the mode button is pressed. Then:
■To reset the AP to the default factory-shipped configuration, keep the mode button pressed for less than 20 seconds. The AP configuration files are cleared.
This resets all configuration settings to factory defaults, including passwords, WEP keys, the IP address, and the SSID.
■To clear the AP internal storage, including all configuration files, keep the mode button pressed for more than 20 seconds, but less than 60 seconds.
The AP status LED changes from Amber to Red, and all the files in the AP storage directory are cleared.
If you keep the mode button pressed for more than 60 seconds, the mode button is assumed faulty and no changes are made.
Note Ensure that your controller is running the latest Cisco Wireless Controller Software Release as specified in the access point data sheet.
Access points can fail to join a controller for many reasons: a RADIUS authorization is pending; self-signed certificates are not enabled on the controller; the access point and the controller regulatory domains don’t match, and so on.
Controller software enables you to configure the access points to send all CAPWAP-related errors to a syslog server. You do not need to enable any debug commands on the controller because all of the CAPWAP error messages can be viewed from the syslog server itself.
The state of the access point is not maintained on the controller until it receives a CAPWAP join request from the access point. Therefore, it can be difficult to determine why the CAPWAP discovery request from a certain access point was rejected. In order to troubleshoot such joining problems without enabling CAPWAP debug commands on the controller, the controller collects information for all access points that send a discovery message to it and maintains information for any access points that have successfully joined it.
The controller collects all join-related information for each access point that sends a CAPWAP discovery request to the controller. Collection begins with the first discovery message received from the access point and ends with the last configuration payload sent from the controller to the access point.
You can view join-related information for up to three times the maximum number of access points supported by the platform for the 2500 series controllers and the Controller Network Module within the Cisco 28/37/28xx Series Integrated Services Routers.
Note The maximum number of access points varies for the Cisco WiSM2, depending on which controller software release is being used.
When the controller is maintaining join-related information for the maximum number of access points, it does not collect information for any more access points.
An access point sends all syslog messages to IP address 255.255.255.255 by default when any of the following conditions are met:
■An access point running software release 8.2.110.0 or later has been newly deployed.
■An existing access point running software release 8.2.110.0 or later has been reset after clearing the configuration.
If any of these conditions are met and the access point has not yet joined a controller, you can also configure a DHCP server to return a syslog server IP address to the access point using option 7 on the server. The access point then starts sending all syslog messages to this IP address.
When the access point joins a controller for the first time, the controller sends the global syslog server IP address (the default is 255.255.255.255) to the access point. After that, the access point sends all syslog messages to this IP address until it is overridden by one of the following scenarios:
■The access point is still connected to the same controller, and the global syslog server IP address configuration on the controller has been changed using the config ap syslog host global syslog_server_IP_address command. In this case, the controller sends the new global syslog server IP address to the access point.
■The access point is still connected to the same controller, and a specific syslog server IP address has been configured for the access point on the controller using the config ap syslog host specific Cisco_AP syslog_server_IP_address command. In this case, the controller sends the new specific syslog server IP address to the access point.
■The access point is disconnected from the controller and joins another controller. In this case, the new controller sends its global syslog server IP address to the access point.
■Whenever a new syslog server IP address overrides the existing syslog server IP address, the old address is erased from persistent storage, and the new address is stored in its place. The access point also starts sending all syslog messages to the new IP address provided the access point can reach the syslog server IP address.
You can configure the syslog server for access points and view the access point join information only from the controller CLI.
Keep these guidelines in mind when you use 1840 series access point:
■The access point can only communicate with Cisco wireless controllers.
■The access point does not support Wireless Domain Services (WDS) and cannot communicate with WDS devices. However, the controller provides functionality equivalent to WDS when the access point joins it.
■CAPWAP does not support Layer 2. The access point must get an IP address and discover the controller using Layer 3, DHCP, DNS, or IP subnet broadcast.
■The access point console port is enabled for monitoring and debug purposes. All configuration commands are disabled when the access point is connected to a controller.
You can use DHCP Option 43 to provide a list of controller IP addresses to the access points, enabling them to find and join a controller.
The following is a DHCP Option 43 configuration example on a Windows 2003 Enterprise DHCP server for use with Cisco Aironet lightweight access points. For other DHCP server implementations, consult product documentation for configuring DHCP Option 43. In Option 43, you should use the IP address of the controller management interface.
Note DHCP Option 43 is limited to one access point type per DHCP pool. You must configure a separate DHCP pool for each access point type.
The 1840 series access point uses the type-length-value (TLV) format for DHCP Option 43. DHCP servers must be programmed to return the option based on the access point DHCP Vendor Class Identifier (VCI) string (DHCP Option 43). The VCI string for the 1840 series access point is:
The format of the TLV block is listed below:
■Length—Number of controller IP addresses * 4
■Value—IP addresses of the WLC management interfaces listed sequentially in hex
To configure DHCP Option 43 in the embedded Cisco IOS DHCP server, follow these steps:
network <IP Network> <Netmask>
default-router <Default router>
<pool name> is the name of the DHCP pool, such as AP1840
<IP Network> is the network IP address where the controller resides, such as 10.0.15.1
<Netmask> is the subnet mask, such as 255.255.255.0
<Default router> is the IP address of the default router, such as 10.0.0.1
<DNS Server> is the IP address of the DNS server, such as 10.0.10.2
The hex string is assembled by concatenating the TLV values shown below:
For example, suppose that there are two controllers with management interface IP addresses, 10.126.126.2 and 10.127.127.2. The type is f1(hex). The length is 2 * 4 = 8 = 08 (hex). The IP addresses translate to 0a7e7e02 and 0a7f7f02. Assembling the string then yields f1080a7e7e020a7f7f02. The resulting Cisco IOS command added to the DHCP scope is option 43 hex f1080a7e7e020a7f7f02.
All user documentation for the Cisco Aironet 1840 series access point is available at the following URL:
https://www.cisco.com/c/en/us/products/wireless/aironet-1840-series-access-points/index.html
For detailed information and guidelines for configuring and deploying your access point in a wireless network, see the following documentation:
■Cisco Wireless Controller Configuration Guide, Release 8.9, at the following URL:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-9/config-guide/b_cg89.html
This section provides declarations of conformity and regulatory information for the Cisco Aironet 1840 Series Access Points. You can find additional information at this URL:
www.cisco.com/go/aironet/compliance
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
This device complies with Part 15 rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference, and
2. This device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits of a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential environment. This equipment generates, uses, and radiates radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference. However, there is no guarantee that interference will not occur. If this equipment does cause interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to correct the interference by one of the following measures:
■Reorient or relocate the receiving antenna.
■Increase separation between the equipment and receiver.
■Connect the equipment to an outlet on a circuit different from which the receiver is connected.
This section provides guidelines for avoiding interference when operating Cisco Aironet access points in Japan. These guidelines are provided in both Japanese and English.
This equipment operates in the same frequency bandwidth as industrial, scientific, and medical devices such as microwave ovens and mobile object identification (RF-ID) systems (licensed premises radio stations and unlicensed specified low-power radio stations) used in factory production lines.
1. Before using this equipment, make sure that no premises radio stations or specified low-power radio stations of RF-ID are used in the vicinity.
2. If this equipment causes RF interference to a premises radio station of RF-ID, promptly change the frequency or stop using the device; contact the number below and ask for recommendations on avoiding radio interference, such as setting partitions.
3. If this equipment causes RF interference to a specified low-power radio station of RF-ID, contact the number below.
When installing the product, please use the provided or designated connection cables/power cables/AC adaptors. Using any other cables/adaptors could cause a malfunction or a fire. Electrical Appliance and Material Safety Law prohibits the use of UL-certified cables (that have the “UL” shown on the code) for any other electrical devices than products designated by CISCO. The use of cables that are certified by Electrical Appliance and Material Safety Law (that have “PSE” shown on the code) is not limited to CISCO-designated products.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante.
This radio transmitter has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device.
Le présent émetteur radio a été approuvé par Industrie Canada pour fonctionner avec les types d'antenne énumérés ci-dessous et ayant un gain admissible maximal et l'impédance requise pour chaque type d'antenne. Les types d'antenne non inclus dans cette liste, ou dont le gain est supérieur au gain maximal indiqué, sont strictement interdits pour l'exploitation de l'émetteur.
Operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems.
La bande 5 150-5 250 MHz est réservés uniquement pour une utilisation à l'intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux.
Users are advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.
Les utilisateurs êtes avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu'ils ont la priorité) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
Note This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. For more details, contact Cisco Corporate Compliance.
The product carries the CE Mark:
This section contains information on compliance with guidelines related to RF exposure.
Generic Discussion on RF Exposure
The Cisco products are designed to comply with the following national and international standards on Human Exposure to Radio Frequencies:
■US 47 Code of Federal Regulations Part 2 Subpart J
■American National Standards Institute (ANSI) / Institute of Electrical and Electronic Engineers / IEEE C 95.1 (99)
■International Commission on Non Ionizing Radiation Protection (ICNIRP) 98
■Ministry of Health (Canada) Safety Code 6. Limits on Human Exposure to Radio Frequency Fields in the range from 3kHz to 300 GHz
■Australia Radiation Protection Standard
To ensure compliance with various national and international Electromagnetic Field (EMF) standards, the system should only be operated with Cisco approved antennas and accessories.
This Device Meets International Guidelines for Exposure to Radio Waves
The 1840 series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) recommended by international guidelines. The guidelines were developed by an independent scientific organization (ICNIRP) and include a substantial safety margin designed to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
The World Health Organization has stated that present scientific information does not indicate the need for any special precautions for the use of wireless devices. They recommend that if you are interested in further reducing your exposure then you can easily do so by reorienting antennas away from the user or placing he antennas at a greater separation distance then recommended.
This Device Meets FCC Guidelines for Exposure to Radio Waves
The 1840 series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) as referenced in FCC Part 1.1310. The guidelines are based on IEEE ANSI C 95.1 (92) and include a substantial safety margin designed to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
The device has been tested and found compliant with the applicable regulations as part of the radio certification process.
The US Food and Drug Administration has stated that present scientific information does not indicate the need for any special precautions for the use of wireless devices. The FCC recommends that if you are interested in further reducing your exposure then you can easily do so by reorienting antennas away from the user or placing the antennas at a greater separation distance then recommended or lowering the transmitter power output.
This Device Meets the Industry Canada Guidelines for Exposure to Radio Waves
The 1840 series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) as referenced in Health Canada Safety Code 6. The guidelines include a substantial safety margin designed into the limit to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
Health Canada states that present scientific information does not indicate the need for any special precautions for the use of wireless devices. They recommend that if you are interested in further reducing your exposure you can easily do so by reorienting antennas away from the user, placing the antennas at a greater separation distance than recommended, or lowering the transmitter power output.
Cet appareil est conforme aux directives internationales en matière d'exposition aux fréquences radioélectriques
Cet appareil de la gamme 1840 comprend un émetteur-récepteur radio. Il a été conçu de manière à respecter les limites en matière d'exposition aux fréquences radioélectriques (champs électromagnétiques de fréquence radio), recommandées dans le code de sécurité 6 de Santé Canada. Ces directives intègrent une marge de sécurité importante destinée à assurer la sécurité de tous, indépendamment de l'âge et de la santé.
Par conséquent, les systèmes sont conçus pour être exploités en évitant que l'utilisateur n'entre en contact avec les antennes. Il est recommandé de poser le système là où les antennes sont à une distance minimale telle que précisée par l'utilisateur conformément aux directives réglementaires qui sont conçues pour réduire l'exposition générale de l'utilisateur ou de l'opérateur.
Santé Canada affirme que la littérature scientifique actuelle n'indique pas qu'il faille prendre des précautions particulières lors de l'utilisation d'un appareil sans fil. Si vous voulez réduire votre exposition encore davantage, selon l'agence, vous pouvez facilement le faire en réorientant les antennes afin qu'elles soient dirigées à l'écart de l'utilisateur, en les plaçant à une distance d'éloignement supérieure à celle recommandée ou en réduisant la puissance de sortie de l'émetteur.
Additional Information on RF Exposure
You can find additional information on the subject at the following links:
■Cisco Systems Spread Spectrum Radios and RF Safety white paper at this URL:
http://www.cisco.com/warp/public/cc/pd/witc/ao340ap/prodlit/rfhr_wi.htm
■FCC Bulletin 56: Questions and Answers about Biological Effects and Potential Hazards of Radio Frequency Electromagnetic Fields
■FCC Bulletin 65: Evaluating Compliance with the FCC guidelines for Human Exposure to Radio Frequency Electromagnetic Fields
You can obtain additional information from the following organizations:
■World Health Organization Internal Commission on Non-Ionizing Radiation Protection at this URL: www.who.int/emf
■United Kingdom, National Radiological Protection Board at this URL: www.nrpb.org.uk
■Cellular Telecommunications Association at this URL: www.wow-com.com
■The Mobile Manufacturers Forum at this URL: www.mmfai.org
This section provides administrative rules for operating Cisco Aironet access points in Taiwan. The rules for all access points are provided in both Chinese and English.
Administrative Rules for Low-power Radio-Frequency Devices
For those low-power radio-frequency devices that have already received a type-approval, companies, business units or users should not change its frequencies, increase its power or change its original features and functions.
The operation of the low-power radio-frequency devices is subject to the conditions that no harmful interference is caused to aviation safety and authorized radio station; and if interference is caused, the user must stop operating the device immediately and can't re-operate it until the harmful interference is clear.
The authorized radio station means a radio-communication service operating in accordance with the Communication Act.
The operation of the low-power radio-frequency devices is subject to the interference caused by the operation of an authorized radio station, by another intentional or unintentional radiator, by industrial, scientific and medical (ISM) equipment, or by an incidental radiator.
Low-power Radio-frequency Devices Technical Specifications
This section contains special information for operation of Cisco Aironet access points in Brazil.
Este equipamento não tem direito à proteção contra interferência prejudicial e não pode causar interferência em sistemas devidamente autorizados.
This equipment is not entitled to the protection from harmful interference and may not cause interference with duly authorized systems.
All the Declaration of Conformity statements related to this product can be found at the following location: http://www.ciscofax.com
■To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
■To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
■To submit a service request, visit Cisco Support.
■To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
■To obtain general networking, training, and certification titles, visit Cisco Press.
■To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.
© 2019 Cisco Systems, Inc. All rights reserved.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)