The nice thing in those specs is that it lists the "Radio Output Power" at
- Radio output power: 32.5 dBm maximum (varies by country)
Hmmm... is thtat EIRP? Or is that just the radio sans antenna?
It doesn't say - but it's so high that it's probably EIRP.
Most home router antennas, AFAICR, are about 18dBi, so 32.5dBm seems pretty high (yeah, I know one is isotropic and the other is compared against 50mW but those are the figures that I have).
The maximum antenna and radio power and EIRP are listed here:
Dunno what he did - as we only noticed the android intruder as I was running through the setup with him showing him what was on 2.4GHz and what was on 5GHz (since I had advised turning off the 2.4GHz if he could get away with it).
Actually, there are rainbow tables so, there are two things you need to do with WPA/PSK-AES which is: a. Use a non-dictionary unique but non-identifying SSID (with _nomap) b. Use a good pass phrase (e.g., two subsequent president's names)
Remember, the lousy choice for a default salt for the passphrase means that every common SSID is *already* compromised in WPA2-PSK; so that's why I told him to use *both* of the above.
Then either he configured the router insecurely or he actually does have an Android device in his house unbeknownst to him. The fact that he calls his laptop an "iMac" makes one wonder about his awareness. Anyhow, this is a good example of how Apple's routers are more secure by design. Apple's routers force you to set a strong pass phrase for WiFi access. Not only that, but there is no default user name or password on Apple routers (which many users fail to ever change, leaving them open for attack), nor is there the standard web server-based configuration facility to attack.
Much better would be to advise him to set up his router securely, or better yet tell him to return that thing and get an Airport Extreme instead.
But I agree with you that we have to even *think* about adding "optout" and "_nomap" to our SSIDs in order to opt *out* of Microsoft and Google silliness respectively.
It should be opt *in* only. But it's not. Sigh.
Remember, the SSID is the *salt* to the encryption. So the SSID matters too. But yes, if your passphrase is unique (truly unique, as in not one of a million known passphrases!), then you're fine.
I never see quoted text. So, repeating the URL helps a person reading this who is hiding quoted text. Most newsreaders, of course, can easily flip between hiding quoted text and not hiding it - but I repeat as a courtesy to the reader who hides quoted text.
I didn't want to be mean to you since you were being nice, but you *do* realize that the spec you gave me *is* a purely M-A-R-K-E-T-I-N-G BS spec, and, as such, is essentially useless, right?
I mean, just *compare* the spec you gave which was a single line for *all* frequencies and *all* countries, against the spec for "my" radio on my roof, which lists not only the spec at *each* frequency, but also the transmit and receive spec, and the error range.
Your purely MARKETING spec (which is almost completely useless):
- Radio output power: 32.5 dBm maximum (varies by country)
A far more useful spec that is much closer to being "real":
-
formatting link
PS: They all lie. But boy oh boy, does Apple hide a *lot* more stuff than Ubiquiti does.
What you gave is the best Apple has - but it's something nobody who really cared about the output could actually use. Notice the difference in the Ubiquiti spec *before* you respond.
I never take the initiative on negativity. I always follow *your* lead & simply respond in kind. You should have noticed that by now.
Apple routers work with devices of any make. And they are more secure, easier to configure, and get updated far longer in the product life cycle than most routers. Those are all good reasons.
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.