NENA Technical Information Document on Network Interfaces for E9-1-1 and Emerging Technologies

Total Page:16

File Type:pdf, Size:1020Kb

NENA Technical Information Document on Network Interfaces for E9-1-1 and Emerging Technologies NENA Technical Information Document E9-1-1 and Emerging Technologies NENA 07-503, September 11, 2002 (Original) NENA Technical Information Document on Network Interfaces for E9-1-1 and Emerging Technologies Prepared by: National Emergency Number Association (NENA) Emerging Technologies Working Group of the Non Traditional Communications Technical Committee Published by: NENA Printed the U.S.A. NENA Technical Information Document E9-1-1 and Emerging Technologies NENA 07-503, September 11, 2002 (Original) NENA TECHNICAL REFERENCE NOTICE This Technical Information Document (TID) is published by the National Emergency Number Association (NENA) as an information source for the designers and manufacturers of systems that are used for the purpose of processing emergency calls. It is not intended to provide complete design specifications or parameters or to assure the quality of performance for systems that process emergency calls. NENA reserves the right to revise this TID for any reason including, but not limited to, conformity with criteria or standards promulgated by various agencies, utilization of advances in the state of the technical arts or to reflect changes in the design of network interface or services described therein. It is possible that certain advances in technology will precede these revisions. Therefore, this TID should not be the only source of information used to implement Emerging Technologies (e.g., Voice over Packet (VoP), Voice over Internet Protocol (VoIP), etc.) specifications when managing and handling emergency calls and the associated information. NENA members are advised to contact their Telecommunications Carrier representative to ensure compatibility with the 911 network. Patents of some Corporations or others may cover the specifications, techniques or network interface/system characteristics disclosed herein. No license expressed or implied is hereby granted. This document is not to be construed as a suggestion to any manufacturer to modify or change any of its products, nor does this document represent any commitment by NENA or any affiliate thereof to purchase any product whether or not it provides the described characteristics. This document has been prepared solely for the voluntary use of E9-1-1 service providers, network interface and system vendors, participating telephone companies, etc. By using this document, the user agrees that the NENA will have no liability for any consequential, incidental, special, or punitive damage that may result. The NENA Non-Traditional Communications Committee Emerging Technologies Working Group has developed this document. Recommendations for change to this document may be submitted to: National Emergency Number Association Attention: Executive Director 422 Beecher Rd. Columbus, OH 43230 Page Introduction - i NENA Technical Information Document E9-1-1 and Emerging Technologies NENA 07-503, September 11, 2002 (Original) Acknowledgments: The following industry experts and their companies are recognized for their contributions in the development of this document. Non-Traditional Committee Chair: Tony Busam, RCC Consultants, Inc. Members: Company Nadine Abbott Telcordia Charles Bell Sprint Tom Breen BellSouth Bernard Brabant Bell Canada (Chair) Richard Bzdega TELUS Cindy Clugy Intrado Elizabeth Colunga WorldCom Carol De Fazio Telcordia Mark Drennan Intrado Kenneth Easley Proctor Jerry Eisner Intrado David Froneberger MCI Worldcom Deborah Guyton Telcordia Tom Hinkelman WinStar Communications Dave Irwin State of Washington Scott Keagy Cisco System Kevin Kearns King County Denise Kellner SBC Gord Kelly CML Technologies Inc. Mark Knox Intrado Marc Linsner Cisco System Peter Macpherson Xwave Steve Marzolf Virginia Department of Telecommunications Nick Nickerson BroadBand Office Nancy Pollock Metropolitan 911 Board Terry Reese Telcordia Gary Rhodenizer Aliant - MTT Robert Russo SBC - Pacific Bell Terry Ryan Tel Control Inc. Bob Sherry Intrado Steve Sipple Nortel Networks Paul Stoffels Ameritech Atul Thaper Telcordia Bob Tilden SBC - Pacific Bell Wesley Tilley Nortel Networks Nate Wilcox State of Vermont Ron Whitehurst Cbeyond Page Introduction - ii NENA Technical Information Document E9-1-1 and Emerging Technologies NENA 07-503, September 11, 2002 (Original) Non-Traditional Committee Chair TABLE OF CONTENTS 1. INTRODUCTION.......................................................................................................................................... 1-1 1.1 General.........................................................................................................................1-1 1.2 Purpose and Scope of Document .................................................................................1-1 1.3 Organization of Document...........................................................................................1-1 1.4 Document Terminology...............................................................................................1-1 1.5 Reason for Issue...........................................................................................................1-2 1.6 Reason for Reissue.......................................................................................................1-2 1.7 Date Compliance................................................................................................................1-2 2. ENHANCED 9-1-1 SYSTEM AND FEATURES....................................................................................... 2-1 2.1 E9-1-1 System and Feature Overview .........................................................................2-1 2.2 General Feature Assignments ......................................................................................2-3 2.3 Automatic Number Identification (ANI)/KEY............................................................2-3 2.4 Automatic Location Identification (ALI) ....................................................................2-4 2.5 TTY / TDD Interface and Compatibility .....................................................................2-4 2.6 Busy Line Verification (BLV) / Busy Line Interrupt (BLI) ........................................2-4 2.7 Other Technical Specifications....................................................................................2-5 3. VOICE USING EMERGING TECHNOLOGIES PACKET BASED APPLICATIONS....................... 3-1 3.1 Voice over Packet (VoP) .............................................................................................3-1 3.2 Voice over Internet Protocol (VoIP) versus Voice over the Internet ..........................3-1 3.3 IP Standard Protocols...................................................................................................3-2 3.4 Industry Standard Organizations .................................................................................3-3 3.5 IP Telephony and E9-1-1.............................................................................................3-3 3.5.1 IP Telephony and Quality of Service (QoS)........................................................3-4 3.5.2 IP Telephony and Network Interworking ............................................................3-5 3.5.3 Gateway ...............................................................................................................3-5 3.5.4 Network Functionality to Support .......................................................................3-6 3.5.5 9-1-1 Specific Functionality to Support...............................................................3-7 3.6 IP Telephony and the Regulators.................................................................................3-8 4. NETWORK INTERFACES.......................................................................................................................... 4-1 4.1 Network Interface Categories ......................................................................................4-1 4.1.1 Voice over the Internet ........................................................................................4-1 4.1.2 Inter-Exchange Routing.......................................................................................4-1 4.1.3 Local Exchange Replacement (including CLECs) ..............................................4-1 4.1.4 Enterprise Networks (e.g., Centrex-IP, IP-enabled PBXs, etc.) ..........................4-2 Page Index - 1 NENA Technical Information Document E9-1-1 and Emerging Technologies NENA 07-503, September 11, 2002 (Original) 4.1.4.1 Example of an Alternative Approach for Determining the Location Information ............................................................4-2 4.1.5 Cable TV/Telephony............................................................................................4-4 4.1.6 Digital Subscriber Line (DSL).............................................................................4-4 4.1.7 VoP-enabled E9-1-1 Call Handling Equipment ..................................................4-6 4.2 Network Interconnection Arrangements......................................................................4-6 4.2.1 End Office to Selective Router Interconnections in a Mixed Technologies Environment.........................................................................................................................4-7 4.2.2 End Office to Selective Router Interconnections using Compatible Packet Technologies........................................................................................................................4-7 4.2.3 Enterprise Network
Recommended publications
  • Application Notes for Avaya IP Office Telephony Infrastructure in A
    Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office Telephony Infrastructure in a Converged VoIP and Data Network using Hewlett Packard Networking Switches configured with 802.1X Authentication - Issue 1.0 Abstract The IEEE 802.1X standard defines a client-server based network access control (NAC) and authentication protocol that restricts unauthorized clients from connecting to a Local Area Network (LAN) through publicly accessible ports. 802.1X provides a means of authenticating and authorizing users attached to a LAN port and of preventing access to that port in cases where the authentication process fails. Hewlett Packard (HP) Networking switches support 802.1X as authenticators and Avaya IP Telephones support 802.1X as supplicants. These Application Notes provides the steps necessary to configure 802.1X on the HP Networking switches for an Avaya IP Telephone with an attached PC. Linux FreeRADIUS is used as the authentication server. Information in these Application Notes has been obtained through DevConnect compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab. RDC; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 21 SPOC 10/18/2012 ©2012 Avaya Inc. All Rights Reserved. HP_IPO80_8021X 1. Introduction The 802.1X protocol is an IEEE standard for media-level network access control (NAC), offering the capability to permit or deny network connectivity, control LAN access, and apply traffic policy, based on user or machine identity. 802.1X consists of three components (or entities): Supplicant – a port access entity (PAE) that requests access to the network.
    [Show full text]
  • GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms
    GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms AAL – ATM Adaptation Layer ADPCM – Adaptive Differential Pulse Code Modulation ADSL – Asymmetric Digital Subscriber Line AIN – Advanced Intelligent Network ALI – Automatic Location Information AMA - Automatic Message Accounting ANI – Automatic Number Identification ANSI –American National Standards Institute API – Applications Programming Interface ATM – Asychronous Transfer Mode BHCA – Busy Hour Call Attempts BHCC – Busy Hour Call Completions B-ISDN – Broadband Integrated Services Digital Network B-ISUP – Broadband ISDN User’s Part BLV – Busy Line Verification BNS – Billed Number Screening BRI – Basic Rate Interface CAC – Carrier Access Code CCS – Centi Call Seconds CCV – Calling Card Validation CDR – Call Detail Record CIC – Circuit Identification Code CLASS – Custom Local Area Signaling CLEC – Competitive Local Exchange Carrier CO – Central Office CPE – Customer Provided/Premise Equipment CPN – Called Party Number CTI – Computer Telephony Intergration DLC – Digital Loop Carrier System DN – Directory Number DSL – Digital Subscriber Line DSLAM – Digital Subscriber Line Access Multiplexer DSP – Digital Signal Processor DTMF – Dual Tone Multi-Frequency ESS – Electronic Switching System ETSI - European Telecommunications Standards Institute GAP – Generic Address Parameter GT – Global Title GTT – Global Title Translations HFC – Hybrid Fiber Coax IAD – Integrated Access Device IAM – Initial Address Message ICP – Integrated Communications Provider ILEC
    [Show full text]
  • Architectures for Broadband Residential IP Services Over CATV Networks Enrique J
    12 Architectures for Broadband Residential IP Services Over CATV Networks Enrique J. Hernandez-Valencia, Bell Laboratories, USA Abstract The current state of the art in digital broadband access technologies to support emerging telecommunications services makes imminent the introduction of interac- tive broadband services — including data, video and the Internet — into the resi- dential market. Over the last few years, much attention has been paid to the development of media access control protocols for cable TV networks that will allow the immediate support of broadband data services as the first step toward enhanced communications services for residential users. Here we review some of the architectural options that must be carefully considered in order to deliver IP ser- vices to such users in an efficient yet flexible manner. uture residential cable data services are expected to • Support for data forwarding/routing services, including IP deliver Internet access, work-at-home applications, Address Resolution Protocol (ARP) and the Internet Con- small business access, local area network LAN-LAN trol Message Protocol (ICMP) interconnect, and LAN emulation services over cable • Host address configuration TV (CATV) networks. These services are anticipated as a • Subscription FFnatural extension to the residential consumer market of the • Security data networking capabilities in the business sector today [1]. In addition, any proposed access architecture for broad- Although related residential Internet Protocol (IP) services band residential data services will be expected to support are already being trialed in the marketplace, substantive existing IP services such as the Dynamic Host Configuration standardization efforts in this area did not materialize until Protocol [6], Domain Name System [8], IP Multicasting and quite recently.
    [Show full text]
  • Telecommunication Services Engineering Lab Roch H. Glitho
    Telecommunication Services Engineering Lab 1 Roch H. Glitho Telecommunication Services Engineering Lab Layering in next generation networks Services ( value-added services) also called application / services . Services (Basic service) also called call/session Transport (Below IP + IP + transport layer) also called bearer 2 Roch H. Glitho Telecommunication Services Engineering Lab Layering in next generation networks Infrastructural, application, middleware and baseware services Services NGN Resources service Service Service . management functions control functions Transport Transport s e management functions control functions c r NGN u o s transport e R Transfer functional area 3 Roch H. Glitho Telecommunication Services Engineering Lab Layering in UMTS UMTS (Universal Mobile Telecommunication Systems) - An example of 3G system: - Evolution of GSM - Use of WCDMA - Largest footprint - Another example of 3G system - Evolution of CDMA -One - Use of WCDMA, but a version incompatible with UMTS - Dwindling footprint 4 Roch H. Glitho Telecommunication Services Engineering Lab Layering in UMTS UMTS (Universal Mobile Telecommunication Systems) - UMTS transport: - TCP - IP - Below IP - WCDMA - Bandwidth (Peak rate: single digit Mbits/s – usually lower than 2) 5 Roch H. Glitho Telecommunication Services Engineering Lab Layering in UMTS UMTS (Universal Mobile Telecommunication Systems) - UMTS Service: - IP Multimedia Subsystem (IMS) - Basic service (call / session or control layer) - Value added services (value added service or service layer) - Focus
    [Show full text]
  • Network Access Control and Cloud Security
    NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X Port-Based NAC Cloud Computing Cloud Security Risks and Countermeasures Cloud Security as a Service (SecaaS) Network Access Control (NAC) • “Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.” – wikipedia. • “NAC is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.” – wikipedia. • NAC authenticates users logging into the network and determines what data they can access and action they can perform. • NAC examines the health of the user’s computer or mobile device (the endpoints). Network Access Control (NAC) • Access requestor (AR): referred to as supplicants, or clients. The AR is the node that is attempting to access the network and may be any device that is managed by the NAC system. • Policy server: Based on the AR’s posture and an enterprise’s defined policy, the policy server determines what access should be granted. • Network access server (NAS): Also called a media gateway, a remote access server (RAS), or a policy server. The NAS functions as an access control point for users in remote locations connecting to an enterprise’s internal network. Network Access Control (NAC) NAC Context Network Access Enforcement Methods • Enforcement methods are the actions that are applied to ARs to regulate access to the enterprise network.
    [Show full text]
  • Glossary of Communications Terms for Relay Engineers
    Glossary of Communications Terms For Relay Engineers A Working Group Report from the H14 WG Of the H – Relaying Communications Subcommittee May 2008 Participants Roger Ray, Chairman Ray Young, Vice Chairman Marc Benou Oscar Bolado Jim Huddelston Stan Klein Ken Martin John Miller Tim Phillippe Mark Simon Mal Swanson Disclaimer This document has been prepared in order to give the Protective Relay Engineer an insight and understanding of communication terms that they may encounter in their work. It is not meant to be a substitute for or replace the IEEE Dictionary. Glossary of Communications Terms For Relay Engineers AAL - ATM Adaptation Layer The standards layer that allows multiple applications to have data converted to and from the ATM cell. A protocol used that translates higher layer services into the size and format of an ATM cell. ACCUNET Switched 56 An AT&T digital service providing switched (dialup) digital service at 56 Kbps. ACCUNET T1.5 An AT&T tariffed data oriented digital service that provides leased end-to-end customer premises terminated T-1 links. ACCUNET T1.5 Reserved A disaster recovery service whereby a switched 1.544 Mbps link is available between COs and is activated when AT&T is notified of the T-1 link failure. ACCUNET T45 An AT&T tariffed service that provides 45 Mbps, DS3 service which can carry 28 T-1 connections (672 voice channels). ACD - Automatic Call Distributor A telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions. ADPCM - Adaptive Differential Pulse Code Modulation A speech coding method which uses fewer bits than the traditional PCM (Pulse Code Modulation).
    [Show full text]
  • Diameter-Based Protocol in the IP Multimedia Subsystem
    International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231 – 2307, Volume- 1 Issue- 6, January 2012 Diameter-Based Protocol in the IP Multimedia Subsystem Vinay Kumar.S.B, Manjula N Harihar Abstract— The Diameter protocol was initially developed by II. ROLE OF DIAMETER IN IMS the Internet Engineering Task Force (IETF) as an Authentication, Authorization, and Accounting (AAA) framework The IMS is based on a horizontally layered architecture, intended for applications such as remote network access and IP consisting of three layers, namely, Service Layer, Control mobility. Diameter was further embraced by the Third Generation Layer, and Connectivity Layer. Service Layer comprises Partnership Project (3GPP) as the key protocol for AAA and application and content servers to execute value-added mobility management in 3G networks. The paper discusses the use services for the user. Control layer comprises network control of Diameter in the scope of the IP Multimedia Subsystem (IMS) as servers for managing call or session set-up, modification and specified by 3GPP. This paper presents a solution for the problem release. The most important of these is the Call Session of how to provide authentication, authorization and accounting Control Function (CSCF). Connectivity Layer comprises of (AAA) for multi-domain interacting services by referring open routers and switches, for both the backbone and the access diameter. We have studied the case of ‘FoneFreez’, a service that provides interaction between different basic services, like network telephony and television. The involvement of several parties like A. IMS functions television provider, telephony provider etc., secure interaction between multiple domains must be assured.
    [Show full text]
  • TC7200.20 User Manual
    Safety Instructions Using equipment safely Your Cable Modem Gateway product has been manufactured to meet European and local safety standards, but you must take care if you want it to perform properly and safely. It is important that you read this booklet completely, especially the safety instructions below. Equipment connected to the protective earth of the building installation through the mains connection or through other equipment with a connection to protective earth and to a cable distribution system using coaxial cable, may in some circumstances create fire hazard. Connection to a cable distribution system has therefore to be provided through a device providing electrical isolation below a certain frequency range (galvanic isolator, see EN 60728-11). If you have any doubts about the installation, operation or safety of the product, please contact your supplier. To avoid the risk of electric shock Disconnect the Cable Modem Gateway product from the mains supply before you connect it to (or disconnect it from) any other equipments. Remember that contact with Mains can be lethal or causes severe electric shock. Never remove the product cover. Should the product fail, contact the Customer Service to arrange repair or service. Never allow anyone to push anything into holes, slots or any other opening in the case Do not block the ventilation slots; never stand it on soft furnishings or carpets Do not put anything on it which might spill or drip into it (e.g. Lighted candles or containers of liquids). Do not expose it to dripping or splashing. If an object or liquid enters inside the Cable Modem, unplug it immediately and contact the Customer Service.
    [Show full text]
  • Broadband Remote Access Server (BRAS)
    BROADBAND REMOTE ACCESS SERVER Saw Yan Paing CCIE #57007 • BRAS are an essential part of broadband topologies to control subscriber Broadband access • BRAS is the access point for subscribers, through which they connect to the broadband network. When a connection is established between BNG and Customer Premise Equipment(CPE),the subscriber can access the broadband Remote services provided by the Network Service Provider(NSP) or Internet Service Provider(ISP). • BRAS establishes and manages subscriber sessions. When a session is active, Access BNG aggregates traffic from various subscriber sessions from an access network , and routes it to the network of the service provider. • BRAS is deployed by the service provider and is present at the first aggregation Server point in the network, such as the edge router. • BRAS effectively manages subscriber access, and subscriber management (BRAS) functions such as: •Authentication, Authorization and Accounting of subscriber sessions •Address assignment •Security •Policy management •Quality of Service(QoS) • BRAS (Broadband Remote Access Server) was the term BRAS or previously used, it is now BNG (Broadband Network BNG? Gateway). There is no functional difference. • Connecting with the Customer Premise Equipment Task of (CPE) that needs to be served broadband services. • Establishing subscriber sessions using IPoE or PPPoE BRAS/BNG protocols • Aggregates the circuit from one or more link access devices ( provides aggregate capabilities for IP,PPP,ATM, etc.) • Interacting with the AAA server that authenticates subscribers, and keeps an account of subscriber sessions. • Interacting with the DHCP server to provide IP address to clients. • Enforce quality of service (QoS) polices • Provide Layer 3 connectivity and routes IP traffic through on ISP backbone network to the Internet • The goal of the BNG architecture is to enable the BNG BNG router to interact with peripheral devices(like CPE)and servers(like AAA and DHCP),in order to provide Architecture broadband connectivity to subscribers and manage subscriber sessions.
    [Show full text]
  • Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems
    M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker s Center for Telecommunications and Advanced Technology McLean, Virginia M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker Sponsors: Federal Highway Administration Contract No.: DTFH61-99-C-00001 Dept. No.: Q020/Q060 Project No.: 0900610F-01 s Center for Telecommunications and Advanced Technology McLean, Virginia ABSTRACT This paper introduces some of the newer broadband wireless communications alternatives and describes how they could be used to provide high-speed connections between fixed, transportable, and mobile facilities. We also describe the new integrated service technologies – devices used to bundle voice, data, and video services for transmission over a single link. In this case, it’s a broadband wireless link. Together, the new broadband wireless and integrated service technologies can be used to provide efficient, cost effective, and flexible multi-service provisioning. We introduce this concept and discuss its potential for Intelligent Transportation Systems (ITS). Suggested Keywords: broadband, wireless, integrated service platform, multi-service access device (MSAD), integrated access device (IAD), Intelligent Transportation Systems (ITS) i ii ACKNOWLEDGMENTS The author wishes to thank Mr. Louis Ruffino and Mr. Carl Kain for their technical and editorial contributions to this effort. iii iv TABLE OF CONTENTS SECTION PAGE 1. Introduction 1-1 1.1 Purpose 1-1 1.2 Scope 1-1 1.3 Organization 1-2 2. The Concept 2-1 2.1 Integrated Services 2-1 2.2 Broadband Wireless 2-2 2.3 Applying Broadband Wireless to the Integrated Service Platform 2-4 3.
    [Show full text]
  • Configure RADIUS Authentication in Wi-Fi Cloud N Troubleshooting
    Wi-Fi Cloud Authenticate Wi-Fi Cloud Users with Microsoft Active Directory and NPS Copyright © 2018 WatchGuard Technologies, Inc. All rights reserved. ii WatchGuard Technologies, Inc. Authenticate Wi-Fi Cloud Users with Microsoft Active Directory and NPS You can use WatchGuard Wi-Fi Cloud APs to authenticate Wi-Fi users with their Active Directory credentials. RADIUS server authentication with 802.1x requires the WPA2 security setting on your SSID. If you have an existing RADIUS server you can integrate the server with Active Directory for authentication and access management, or use the Microsoft NPS (Network Policy Server). In this example, we use NPS. n Each WatchGuard AP that will perform 802.1x authentication must be configured as a client on the RADIUS server. The AP must be configured with a static IP address or use DHCP reserved addresses. n All authenticating APs will need to be able to contact the IP address and port for the RADIUS server n The server must host a certificate from a Certificate Authority (CA) trusted by clients on the network n WPA2-Enterprise with 802.1x authentication can be used to authenticate wireless clients. The wireless client authenticates with the RADIUS server using any EAP method configured on the RADIUS server. Configuration Steps n Add WatchGuard APs as RADIUS Clients in NPS n Define a Network Policy in NPS n Configure RADIUS Profiles in Wi-Fi Cloud n Configure RADIUS Authentication in Wi-Fi Cloud n Troubleshooting Add WatchGuard APs as RADIUS Clients in NPS To add WatchGuard APs as RADIUS Clients in NPS: 1.
    [Show full text]
  • Wifi 6 AX1800/AX3600 Dual Band Poe/Poe+ Access Points, WAX214 and WAX218
    User Manual WiFi 6 AX1800/AX3600 Dual Band PoE/PoE+ Access Points Models WAX214 WAX218 NETGEAR, Inc. December 2020 350 E. Plumeria Drive 202-12175-01 San Jose, CA 95134, USA NETGEAR WiFi 6 AX1800/AX3600 Dual Band PoE/PoE+ Access Points, WAX214 and WAX218 Support and Community Visit netgear.com/support to get your questions answered and access the latest downloads. You can also check out our NETGEAR Community for helpful advice at community.netgear.com. Regulatory and Legal Si ce produit est vendu au Canada, vous pouvez accéder à ce document en français canadien à https://www.netgear.com/support/download/. (If this product is sold in Canada, you can access this document in Canadian French at https://www.netgear.com/support/download/.) For regulatory compliance information including the EU Declaration of Conformity, visit https://www.netgear.com/about/regulatory/. See the regulatory compliance document before connecting the power supply. For NETGEAR’s Privacy Policy, visit https://www.netgear.com/about/privacy-policy. By using this device, you are agreeing to NETGEAR’s Terms and Conditions at https://www.netgear.com/about/terms-and-conditions. If you do not agree, return the device to your place of purchase within your return period. Do not use this device outdoors. The PoE source is intended for intra building connection only. Trademarks © NETGEAR, Inc., NETGEAR, and the NETGEAR Logo are trademarks of NETGEAR, Inc. Any non-NETGEAR trademarks are used for reference purposes only. Revision History Publication Part Publish Date Comments Number
    [Show full text]