Cisco Catalyst Series 9105AXW Wireless Access Points
Communications, Services, and Additional Information
First Published: August 11, 2020
Last Updated: March 30, 2023
Last Updated: January 31, 2024
About the Cisco Catalyst Series 9105AXW and 9105AXWT Wireless Access Points
AP Views, Ports, and Connectors
Preparing the AP for Installation
Performing a Pre-Installation Configuration
Configuring and Deploying the Access Point
Checking the Access Point LEDs
Miscellaneous Usage and Configuration Guidelines
Declarations of Conformity and Regulatory Information
Communications, Services, and Additional Information
This guide provides instructions on how to install your Cisco Catalyst Series 9105AXW and 9105AXWT access points and provides links to resources that can help you configure it. This guide also provides mounting instructions and troubleshooting information.
Note that the C9105AXW and C9105AXWT access points are referred to as the access point or the AP in this document.
The Cisco Catalyst 9105AXW and 9105AXWT series wireless access points are advanced dual-band, dual-concurrent, enterprise 802.11ax (Wi-Fi 6) APs with integrated antennas. These wall-mounted APs support 2x2:2 SS MU-MIMO applications and are designed to use both 2.4 GHz and the 5 GHz bands. The APs support full interoperability with leading 802.11ax and 802.11ac clients, along with a mixed deployment with other APs and controllers.
A full listing of the AP's features and specifications are provided in the Cisco Catalyst 9105AXW and 9105AXWT Series Access Point Data Sheet, at the following URL:
https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9100ax-access-points/datasheet-c78-744062.html
The access point remains the same for both the models, the difference is in the mounting of the AP.
The Cisco Catalyst 9105AXW AP uses the wall mountable bracket (AIR-AP-BRACKET-W4) that allows the AP to be installed vertically on a wall. This model is suited for hospitality, residence halls, or other multi-dwelling units.
Note Our goal was to reuse the existing AIR-AP-BRACKET-W3. However, a new wall bracket—AIR-AP-BRACKET-W4, was introduced based on engineering requirements. At the same time to reduce the installation impact, mounting brackets “W4” and “W3” share the same mounting holes and do not require re-drilling for W4 bracket installation.
The Cisco Catalyst 9105AXWT AP uses the cradle allowing the AP to be placed horizontally on a desk. This AP establishes a highly secured enterprise wireless and wired connection to the home, micro-branch, or other types of remote sites. This access point extends the corporate network to teleworkers, mobile workers, or micro-sites, providing experience consistent with that at the corporate office.
The C9105AXW and C9105AXWT wireless APs are wireless controller-based products and support the following features:
■Two dual-band internal antennas and one single-band internal IoT–BLE antenna in both the C9105AXW and C9105AXWT-x AP models
Note The ‘x’ in the model numbers represents the regulatory domain. For information on supported regulatory domains, see the AP Model Numbers and Regulatory Domains.
■Integrated antennas that are directional in azimuth, for both 2.4 GHz (peak gain 3dBi) and 5 GHz (peak gain 5dBi) bands.
■The following hardware external interfaces:
–1x100/1000/2500 Multigigabit Ethernet (RJ-45)
–3x10/100/1000 BASE-T Ethernet (RJ-45)
–RS-232 console interface through RJ-45
Note The AP may face issues while booting if you use an unterminated console cable (not plugged into any device or terminal) or a console cable that is more than one meter in length.
–Passive pass-through port (RJ-45)
–Mode button (enables partial or full system configuration recovery)
■One multi-color LED Status indicator. see the Checking the Access Point LEDs for information on the colors of the LED status indicator.
■Simultaneous 2x2 Multiple-Input Multiple-Output (MIMO) with 2 spatial streams for both 2.4 GHz and 5 GHz bands.
■Multiuser (MU) MIMO technology with 2 spatial streams for downlink.
■MIMO equalization capabilities, which optimize uplink performance and reliability by reducing the impact of signal fade.
■Orthogonal Frequency Division Multiple Access (OFDMA)-based scheduling for both uplink and downlink.
■Spatial Reuse (also known as Basic Service Set (BSS) coloring) which allows APs and their clients to differentiate between BSSs, thus permitting more simultaneous transmissions.
■New power savings mode called Target Wake Time (TWT) which allows the client to stay asleep and wake up only at pre-scheduled (target) times to exchange data with the AP. This provides significant energy savings for battery-operated devices.
■Cisco Catalyst Center support enables Cisco Spaces, Apple FastLane and Cisco Identity Services Engine.
■Cross-AP Noise Reduction, a Cisco innovation that enables APs to intelligently collaborate in real time about RF conditions so that users connect with optimized signal quality and performance.
■Optimized AP Roaming for ensuring that client devices associate with the AP in their coverage range that offers the fastest data rate available.
■Cisco CleanAir delivers proactive, high-speed spectrum intelligence across 20-, 40-, and 80-MHz-wide channels to combat performance problems arising from wireless interference.
This AP supports both lightweight deployments (using Cisco Wireless Controllers) and Cisco Embedded Wireless Controller deployments. The AP can operate in the following modes:
■Local: This is the default mode for the Cisco AP. In this mode, the AP serves clients.
In local mode, the AP creates two CAPWAP tunnels to the Cisco WLC, one for management and the other for data traffic. This is known as central switching because the data traffic is switched (bridged) from the AP to the controller where it is then routed.
■FlexConnect: In FlexConnect mode (previously known as HREAP), the data traffic is switched locally and is not sent to the controller. In this mode, the Cisco AP behaves like an autonomous AP, but is managed by the Cisco WLC. Here, the AP continues to function even if connection to the controller is lost.
■Monitor: In the monitor mode, specified Cisco APs can exclude themselves from handling data traffic between clients and the infrastructure. These APs act as dedicated sensors for location based services (LBS), rogue AP detection, and intrusion detection (IDS).
When APs are in monitor mode, they actively monitor the airwaves and typically do not serve clients.
■Sniffer: In the wireless sniffer mode, the AP starts sniffing the air on a given channel. It captures and forwards all the packets from the clients on that channel to a remote machine that runs Airopeek or Wireshark (packet analyzers for IEEE 802.11 wireless LANs). This includes information on the time stamp, signal strength, packet size, etc.
Note In the sniffer mode, the server to which the data is sent should be on the same VLAN as the wireless controller management VLAN otherwise an error will be displayed.
You need to verify whether the AP model you have is approved for use in your country. The x in the model number is a placeholder for the regulatory domain. To verify approval and to identify the regulatory domain that corresponds to a particular country, visit http://www.cisco.com/go/aironet/compliance. Not all regulatory domains have been approved. As and when they are approved, this compliance list will be updated.
The C9105AXW and C9105AXWT AP models have two internal dual-band antennas with a dedicated 2.4 GHz radio and a 5 GHz radio, and one internal single-band antenna with a dedicated 2.4 GHz IOT radio that supports a BLE device.
The AP can be vertically mounted on a wall or on a standard junction box. Physical security is offered with the included Torx screw and the option to add a Kensington lock.
Translated versions of the following safety warnings are provided in the translated safety warnings document that is shipped with your access point.
To unpack the access point, follow these steps:
Security screw hole location under a mylar cover |
|
Status LED1 |
|
1.For more information on the status LED, see Checking the Access Point LEDs. |
Mode button2 |
|||
Pass-through port3 |
|||
Passive pass-through (RJ-45) port from the back of the AP to the base of the AP.4 |
|||
PSE (LAN port 1) |
2.5GbE mGig uplink port5 which supports the following: |
Before you mount and deploy your access point, we recommend that you perform a site survey (or use the site planning tool) to determine the best location to install your access point.
You should have the following information about your wireless network available:
■Access point mounting options: below a suspended ceiling, on a flat horizontal surface, or on a desk top.
Note You can mount the access point above a suspended ceiling but you must purchase additional mounting hardware: See Mounting the Access Point for additional information.
■Access point power options: 802.3at (PoE+) (Cisco Power Injector AIR-PWRINJ6=), 802.3af (Cisco Power Injector AIR-PWRINJ5=), Cisco Universal PoE (Cisco UPOE), or hub (usually located in a wiring closet).
■Operating temperature: 32°—122°F (0°—50°C)
Note When installing the AP in an environment where the ambient temperature is in the range of 104°—122°F (>40°—50°C), the access point configuration will change from 8x8 to 4x4 on the 5 GHz radios and the uplink Ethernet will downgrade to 1GbE. However, the USB port will remain enabled.
Cisco recommends that you make a site map showing access point locations so that you can record the device MAC addresses from each location and return them to the person who is planning or managing your wireless network.
Installing the access point involves these operations:
Note Performing a pre-installation configuration is an optional procedure. However, performing this procedure ensures that your access point installation and initial operation go as expected.
If your network controller is properly configured, you can install your access point in its final location and connect it to the network from there. See the Deploying the Access Point on the Wireless Network for details.
The pre-installation configuration setup is illustrated in Pre-Installation Configuration Setup.
For pre-installation configuration, perform the following steps:
Note An 802.11ax Cisco AP will be assigned an IP address from the DHCP server only if a default router (gateway) is configured on the DHCP server (enabling the AP to receive its gateway IP address) and the gateway ARP is resolved.
Note The access point requires a gigabit Ethernet (GbE) link to prevent the Ethernet port from becoming a bottleneck for traffic because wireless traffic speeds exceed transmit speeds of a 10/100 Ethernet port.
Note If the access point remains in this mode for more than five minutes, it indicates that the access point is unable to find the primary Cisco Wireless Controller. Check the connection between the access point and the Cisco Wireless Controller and be sure that they are on the same subnet.
Cisco Catalyst 9105AXW series access points can be mounted directly on a wall or on an electrical or network box, to numerous global wall junction standards.
When mounting the AP in areas where there is a possibility of the AP being knocked off the mounting bracket, use the lock hasp on the back of the AP to lock it to the bracket.
To mount the AP on a wall, follow these steps:
If you are unable to connect a PoE cable to the port on the back of the AP, then:
This connection sends power internally from the Pass-Through port on the base, to the Pass-Through port on the back, and then though the jumper cable into the PoE port on the back.
To mount the AP on an electrical junction box, follow these steps:
If you are unable to connect a PoE cable to the port on the back of the AP, then:
This connection sends power internally from the Pass-Through port on the base, to the Pass-Through port on the back, and then though the jumper cable into the PoE port on the back.
Wall-Mount Spacer in C9105AXW-KIT shows the mounting points for the kit to the wall and for the AP wall plate to the spacer.
Dimensions of Wall-Mount Spacer in C9105AXW-KIT (All values in millimeter) shows the dimensions for the wall mount spacer kit.
The spacer kit helps mount the AP on a wall. Use this kit when there are space constraints to mount the AP. The spacer kit (C9105AXW-KIT=) is optional and needs to be added along with the AP order or purchased separately.
To mount the AP on a wall using a spacer box, follow these steps:
If you are unable to connect a PoE cable to the port on the back of the AP, then:
This connection sends power internally from the Pass-Through port on the base, to the Pass-Through port on the back, and then though the jumper cable into the PoE port on the back.
Note The punch-out holes on the spacer box can be used for routing cables. However, an RJ45 connector will not fit through these holes. If this is required, you must first route a cable through the hole and then crimp an RJ45 connector on to the cable.
The spacer kit helps mount the AP on an electrical junction box. This spacer avoids exposing Ethernet cable to the elements. The the pass-through Ethernet port is used to connect the Ethernet cable to the AP.
M3X8mm pan head tapping screws for fastening the wall-mount bracket to the spacer. |
|||
6-32 x 1.62_inch screws for fastening the spacer-bracket assembly to the junction box. |
To mount the AP on an electrical junction box using a spacer box, follow these steps:
If you are unable to connect a PoE cable to the port on the back of the AP, then:
This connection sends power internally from the Pass-Through port on the base, to the Pass-Through port on the back, and then though the jumper cable into the PoE port on the back.
Note The punch-out holes on the spacer box can be used for routing cables. However, an RJ45 connector will not fit through these holes. If this is required, you must first route a cable through the hole and then crimp an RJ45 connector on to the cable.
The cover—C9105AXWT_COVER for the Cisco Catalyst 9105AXWT allows you to place the AP horizontally on the desk. This kit contains the back cover with rubber feet, RJ-45 jumper cable, and mylar cover for the screw slot at the top of the AP.
To mount the Kit C9105AXWT_COVER= to the AP, follow these steps:
This connection sends power internally from the Pass-Through port on the base, to the Pass-Through port on the back, and then though the jumper cable into the PoE port on the back.
The AP can be powered only through Power-over-Ethernet (PoE) using the following:
■802.3at (PoE+): Any 802.3at (30.0 W) compliant switch port or Cisco Power Injector AIR-PWRINJ6=
■802.3af: Any 802.3af (15.4 W) compliant switch port or Cisco Power Injector AIR-PWRINJ5=
Note If 802.3af is used, the USB port and LAN PSE1 port will be off.
This section describes how to connect the access point to a controller. Because the configuration process takes place on the controller, see the Cisco Wireless Controller Configuration Guide for additional information.
Access points must be discovered by a controller before they can become an active part of the network. The access point supports these controller discovery processes:
■Locally stored controller IP address discovery—If the access point was previously joined to a controller, the IP addresses of the primary, secondary, and tertiary controllers are stored in the access point non-volatile memory. This process of storing controller IP addresses on an access point for later deployment is called priming the access point. For more information about priming, see the Performing a Pre-Installation Configuration.
■DHCP server discovery—This feature uses DHCP option 43 to provide controller IP addresses to the access points. Cisco switches support a DHCP server option that is typically used for this capability. For more information about DHCP option 43, see the Configuring DHCP Option 43.
■DNS discovery—The access point can discover controllers through your domain name server (DNS). For the access point to do so, you must configure your DNS to return controller IP addresses in response to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name. Configuring the CISCO-CAPWAP-CONTROLLER provides backwards compatibility in an existing customer deployment. When an access point receives an IP address and DNS information from a DHCP server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS sends a list of controller IP addresses, the access point sends discovery requests to the controllers.
After you have mounted the access point, follow these steps to deploy it on the wireless network:
The location of the access point status LED is shown in Face of the 9105AXW and C9105AXWT Models.
Note Regarding LED status colors, it is expected that there will be small variations in color intensity and hue from unit to unit. This is within the normal range of the LED manufacturer’s specifications and is not a defect. However, the intensity of the LED can be changed through the controller.
The access point status LED indicates various conditions and are described in LED Status Indications.
Using the Mode button (see Ports and Connectors on the 9105AXW and C9105AXWT Models) you can:
■Reset the AP to the default factory-shipped configuration.
■Clear the AP internal storage, including all configuration files.
To use the mode button, press, and keep pressed, the mode button on the access point during the AP boot cycle. Wait until the AP console shows a seconds counter. Once the counter indicates the number of seconds the mode button is pressed, the AP status LED changes to blinking red. Then:
■To reset the AP to the default factory-shipped configuration, keep the mode button pressed for less than 20 seconds. The AP configuration files are cleared.
This resets all configuration settings to factory defaults, including passwords, the IP address, and the SSID.
■To clear the AP internal storage, including all configuration files, keep the mode button pressed for more than 20 seconds, but less than 60 seconds.
Note If the mode button is pressed for more than 30 seconds but less than 60 seconds, the FIPS mode flag is also cleared during the full factory reset of the AP. The FIPS flag when set disables console access.
The AP status LED changes from Blue to Red, and all the files in the AP storage directory are cleared.
If you keep the mode button pressed for more than 60 seconds, the mode button is assumed faulty and no changes are made.
Note As specified in the Cisco Wireless Solutions Software Compatibility Matrix, ensure that your controller is running controller software release 8.10.105.0 or IOS-XE 17.3.x or later to support C9105AXW.
Access points can fail to join a controller for many reasons: a RADIUS authorization is pending; self-signed certificates are not enabled on the controller; the access point and the controller regulatory domains don’t match, and so on.
Controller software enables you to configure the access points to send all CAPWAP-related errors to a syslog server. You do not need to enable any debug commands on the controller because all of the CAPWAP error messages can be viewed from the syslog server itself.
The state of the access point is not maintained on the controller until it receives a CAPWAP join request from the access point. Therefore, it can be difficult to determine why the CAPWAP discovery request from a certain access point was rejected. In order to troubleshoot such joining problems without enabling CAPWAP debug commands on the controller, the controller collects information for all access points that send a discovery message to it and maintains information for any access points that have successfully joined it.
The controller collects all join-related information for each access point that sends a CAPWAP discovery request to the controller. Collection begins with the first discovery message received from the access point and ends with the last configuration payload sent from the controller to the access point.
When the controller is maintaining join-related information for the maximum number of access points, it does not collect information for any more access points.
An access point sends all syslog messages to IP address 255.255.255.255 by default.
You can also configure a DHCP server to return a syslog server IP address to the access point using option 7 on the server. The access point then starts sending all syslog messages to this IP address.
When the access point joins a controller for the first time, the controller sends the global syslog server IP address (the default is 255.255.255.255) to the access point. After that, the access point sends all syslog messages to this IP address until it is overridden by one of the following scenarios:
■The access point is still connected to the same controller, and the global syslog server IP address configuration on the controller has been changed using the config ap syslog host global syslog_server_IP_address command. In this case, the controller sends the new global syslog server IP address to the access point.
■The access point is still connected to the same controller, and a specific syslog server IP address has been configured for the access point on the controller using the config ap syslog host specific Cisco_AP syslog_server_IP_address command. In this case, the controller sends the new specific syslog server IP address to the access point.
■The access point is disconnected from the controller and joins another controller. In this case, the new controller sends its global syslog server IP address to the access point.
■Whenever a new syslog server IP address overrides the existing syslog server IP address, the old address is erased from persistent storage, and the new address is stored in its place. The access point also starts sending all syslog messages to the new IP address provided the access point can reach the syslog server IP address.
You can configure the syslog server for access points and view the access point join information from the controller CLI.
Keep these guidelines in mind when you use C9105AXW series access point:
■The access point can only communicate with Cisco wireless controllers.
■The access point does not support Wireless Domain Services (WDS) and cannot communicate with WDS devices. However, the controller provides functionality equivalent to WDS when the access point joins it.
■CAPWAP does not support Layer 2. The access point must get an IP address and discover the controller using Layer 3, DHCP, DNS, or IP subnet broadcast.
■The access point console port is enabled for monitoring and debug purposes. All configuration commands are disabled when the access point is connected to a controller.
You can use DHCP Option 43 to provide a list of controller IP addresses to the access points, enabling them to find and join a controller.
The following is a DHCP Option 43 configuration example on a Windows 2003 Enterprise DHCP server for use with Cisco Catalyst lightweight access points. For other DHCP server implementations, consult product documentation for configuring DHCP Option 43. In Option 43, you should use the IP address of the controller management interface.
Note DHCP Option 43 is limited to one access point type per DHCP pool. You must configure a separate DHCP pool for each access point type.
The C9105AXW series access point uses the type-length-value (TLV) format for DHCP Option 43. DHCP servers must be programmed to return the option based on the access point DHCP Vendor Class Identifier (VCI) string (DHCP Option 43). The VCI string for the C9105AXW series access point is:
The format of the TLV block is listed below:
■Length—Number of controller IP addresses * 4
■Value—IP addresses of the WLC management interfaces listed sequentially in hex
To configure DHCP Option 43 in the embedded Cisco IOS DHCP server, follow these steps:
network <IP Network> <Netmask>
default-router <Default router>
<pool name> is the name of the DHCP pool, such as AP9105AXW
<IP Network> is the network IP address where the controller resides, such as 10.0.15.1
<Netmask> is the subnet mask, such as 255.255.255.0
<Default router> is the IP address of the default router, such as 10.0.0.1
<DNS Server> is the IP address of the DNS server, such as 10.0.10.2
The hex string is assembled by concatenating the TLV values shown below:
For example, suppose that there are two controllers with management interface IP addresses, 10.126.126.2 and 10.127.127.2. The type is f1(hex). The length is 2 * 4 = 8 = 08 (hex). The IP addresses translate to 0a7e7e02 and 0a7f7f02. Assembling the string then yields f1080a7e7e020a7f7f02. The resulting Cisco IOS command added to the DHCP scope is option 43 hex f1080a7e7e020a7f7f02.
The IEEE 802.11ax standard, also known as the High-Efficiency Wireless (HEW) or Wi-Fi 6, builds off of the 802.11ac and delivers a better experience in typical environments, and a more predictable performance for advanced applications such as 4K or 8K video, high-density high-definition collaboration applications, all-wireless offices and Internet-of-Things (IoT). 802.11ax is designed to use both 2.4Ghz and the 5GHz bands, unlike prior standards.
Cisco Multigigabit Ethernet (mGig) is a unique Cisco innovation also available in the Cisco Catalyst 9105AXW series access point. With the increasing popularity of 802.11ax and new wireless applications, wireless devices now require more network bandwidth. Hence, there is a need for a technology that supports speeds higher than 1 Gbps on all cabling infrastructure. Cisco Multigigabit technology allows you to achieve bandwidth speeds from 1 to 10 Gbps over traditional Cat 5e cabling or newer. The C9105AXW AP supports up to 2.5 Gbps using mGig.
For more information see the following Cisco Multigigabit FAQ document:
http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/catalyst-multigigabit-switching/multigigabit-ethernet-technology.pdf
All user documentation for the Cisco Catalyst 9105AXW series access point is available at the following URL:
https://www.cisco.com/c/en/us/support/wireless/catalyst-9100ax-access-points/series.html
For detailed information and guidelines for configuring and deploying your access point in a wireless network, see the following documentation:
■Cisco Catalyst 9105AXW Series Access Point Deployment Guide, at the following URL:
https://www.cisco.com/c/en/us/products/wireless/catalyst-9100ax-access-points/datasheet-listing.html
■Cisco Wireless Controller Configuration Guide, Release 8.10, at the following URL:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-10/config-guide/b_cg810.html
■Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Amsterdam 17.3.x, at the following URL:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-3/config-guide/b_wl_17_3_cg.html
This section provides declarations of conformity and regulatory information for the Cisco Catalyst 9105AXW Series Access Points. You can find additional information at this URL:
www.cisco.com/go/aironet/compliance
Cisco Systems, Inc.
125 West Tasman Drive
San Jose, CA 95134-1706
USA
This device complies with Part 15 rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference, and
2. This device must accept any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits of a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential environment. This equipment generates, uses, and radiates radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference. However, there is no guarantee that interference will not occur. If this equipment does cause interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to correct the interference by one of the following measures:
■Reorient or relocate the receiving antenna.
■Increase separation between the equipment and receiver.
■Connect the equipment to an outlet on a circuit different from which the receiver is connected.
This section provides guidelines for avoiding interference when operating Cisco Catalyst access points in Japan. These guidelines are provided in both Japanese and English.
This equipment operates in the same frequency bandwidth as industrial, scientific, and medical devices such as microwave ovens and mobile object identification (RF-ID) systems (licensed premises radio stations and unlicensed specified low-power radio stations) used in factory production lines.
1. Before using this equipment, make sure that no premises radio stations or specified low-power radio stations of RF-ID are used in the vicinity.
2. If this equipment causes RF interference to a premises radio station of RF-ID, promptly change the frequency or stop using the device; contact the number below and ask for recommendations on avoiding radio interference, such as setting partitions.
3. If this equipment causes RF interference to a specified low-power radio station of RF-ID, contact the number below.
When installing the product, please use the provided or designated connection cables/power cables/AC adaptors. Using any other cables/adaptors could cause a malfunction or a fire. Electrical Appliance and Material Safety Law prohibits the use of UL-certified cables (that have the “UL” shown on the code) for any other electrical devices than products designated by CISCO. The use of cables that are certified by Electrical Appliance and Material Safety Law (that have “PSE” shown on the code) is not limited to CISCO-designated products.
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pour l'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement d'une communication satisfaisante.
This radio transmitter has been approved by Industry Canada to operate with the antenna types listed below with the maximum permissible gain and required antenna impedance for each antenna type indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for that type, are strictly prohibited for use with this device.
Le présent émetteur radio a été approuvé par Industrie Canada pour fonctionner avec les types d'antenne énumérés ci-dessous et ayant un gain admissible maximal et l'impédance requise pour chaque type d'antenne. Les types d'antenne non inclus dans cette liste, ou dont le gain est supérieur au gain maximal indiqué, sont strictement interdits pour l'exploitation de l'émetteur.
Operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems.
La bande 5 150-5 250 MHz est réservés uniquement pour une utilisation à l'intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux.
Users are advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices.
Les utilisateurs êtes avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu'ils ont la priorité) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL.
C9105AXW-E
C9105AXW-EWC-E
C9105AXWT-E
Note This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. For more details, contact Cisco Corporate Compliance.
The product carries the CE Mark:
This section contains information on compliance with guidelines related to RF exposure.
The Cisco products are designed to comply with the following national and international standards on Human Exposure to Radio Frequencies:
■US 47 Code of Federal Regulations Part 2 Subpart J
■American National Standards Institute (ANSI) / Institute of Electrical and Electronic Engineers / IEEE C 95.1 (99)
■International Commission on Non Ionizing Radiation Protection (ICNIRP) 98
■Ministry of Health (Canada) Safety Code 6. Limits on Human Exposure to Radio Frequency Fields in the range from 3kHz to 300 GHz
■Australia Radiation Protection Standard
To ensure compliance with various national and international Electromagnetic Field (EMF) standards, the system should only be operated with Cisco approved antennas and accessories.
The C9105AXW series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) recommended by international guidelines. The guidelines were developed by an independent scientific organization (ICNIRP) and include a substantial safety margin designed to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
The World Health Organization has stated that present scientific information does not indicate the need for any special precautions for the use of wireless devices. They recommend that if you are interested in further reducing your exposure then you can easily do so by reorienting antennas away from the user or placing he antennas at a greater separation distance then recommended.
The C9105AXW series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) as referenced in FCC Part 1.1310. The guidelines are based on IEEE ANSI C 95.1 (92) and include a substantial safety margin designed to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
The device has been tested and found compliant with the applicable regulations as part of the radio certification process.
The US Food and Drug Administration has stated that present scientific information does not indicate the need for any special precautions for the use of wireless devices. The FCC recommends that if you are interested in further reducing your exposure then you can easily do so by reorienting antennas away from the user or placing the antennas at a greater separation distance then recommended or lowering the transmitter power output.
The C9105AXW series device includes a radio transmitter and receiver. It is designed not to exceed the limits for exposure to radio waves (radio frequency electromagnetic fields) as referenced in Health Canada Safety Code 6. The guidelines include a substantial safety margin designed into the limit to ensure the safety of all persons, regardless of age and health.
As such the systems are designed to be operated as to avoid contact with the antennas by the end user. It is recommended to set the system in a location where the antennas can remain at least a minimum distance as specified from the user in accordance to the regulatory guidelines which are designed to reduce the overall exposure of the user or operator.
Health Canada states that present scientific information does not indicate the need for any special precautions for the use of wireless devices. They recommend that if you are interested in further reducing your exposure you can easily do so by reorienting antennas away from the user, placing the antennas at a greater separation distance than recommended, or lowering the transmitter power output.
Cet appareil de la gamme C9105AXW comprend un émetteur-récepteur radio. Il a été conçu de manière à respecter les limites en matière d'exposition aux fréquences radioélectriques (champs électromagnétiques de fréquence radio), recommandées dans le code de sécurité 6 de Santé Canada. Ces directives intègrent une marge de sécurité importante destinée à assurer la sécurité de tous, indépendamment de l'âge et de la santé.
Par conséquent, les systèmes sont conçus pour être exploités en évitant que l'utilisateur n'entre en contact avec les antennes. Il est recommandé de poser le système là où les antennes sont à une distance minimale telle que précisée par l'utilisateur conformément aux directives réglementaires qui sont conçues pour réduire l'exposition générale de l'utilisateur ou de l'opérateur.
Santé Canada affirme que la littérature scientifique actuelle n'indique pas qu'il faille prendre des précautions particulières lors de l'utilisation d'un appareil sans fil. Si vous voulez réduire votre exposition encore davantage, selon l'agence, vous pouvez facilement le faire en réorientant les antennes afin qu'elles soient dirigées à l'écart de l'utilisateur, en les plaçant à une distance d'éloignement supérieure à celle recommandée ou en réduisant la puissance de sortie de l'émetteur.
You can find additional information on the subject at the following links:
■Cisco Systems Spread Spectrum Radios and RF Safety white paper at this URL:
http://www.cisco.com/warp/public/cc/pd/witc/ao340ap/prodlit/rfhr_wi.htm
■FCC Bulletin 56: Questions and Answers about Biological Effects and Potential Hazards of Radio Frequency Electromagnetic Fields
■FCC Bulletin 65: Evaluating Compliance with the FCC guidelines for Human Exposure to Radio Frequency Electromagnetic Fields
You can obtain additional information from the following organizations:
■World Health Organization Internal Commission on Non-Ionizing Radiation Protection at this URL: www.who.int/emf
■United Kingdom, National Radiological Protection Board at this URL: www.nrpb.org.uk
■Cellular Telecommunications Association at this URL: www.wow-com.com
■The Mobile Manufacturers Forum at this URL: www.mmfai.org
This section provides administrative rules for operating Cisco Catalyst access points in Taiwan. The rules for all access points are provided in both Chinese and English.
Low-power Radio-frequency Devices Technical Specifications
This section contains special information for operation of Cisco Catalyst access points in Brazil.
All the Declaration of Conformity statements related to this product can be found at the following location: http://www.ciscofax.com
■To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
■To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
■To submit a service request, visit Cisco Support.
■To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
■To obtain general networking, training, and certification titles, visit Cisco Press.
■To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.