LogoLogo
  • EWS Series User Manual
  • Product Overview
    • Introduction
    • LED Behavior
    • Comparison Table
    • Technical Specification
  • Getting Started
    • Management Interface
    • Connecting the Switch
  • Wireless Controller Features
    • Managing EnSky Access Points
    • Device Management
      • Access Points
      • Access Point Settings
      • AP Groups
      • Wireless Services
    • Monitor
      • Active Clients
      • Rogue AP Detection
      • System Log
      • Email Alert
    • Visualization
      • Topology View
      • Map View
      • Floor View
      • Mesh View
    • Statistics
      • Access Points
      • Wireless Clients
      • Real-Time Throughput
    • Hotspot Services
      • Captive Portal
      • Guest Account
    • Mesh
      • Mesh Profile
      • Node List
      • Mesh Tools
      • Isolated Nodes
    • Maintenance
      • Schedule Tasks
      • Troubleshooting
      • Bulk Upgrade
      • One-click Update
      • SSL Certificate
      • Check Codes
  • Ethernet Switch Features
    • System
      • Summary
      • Network Settings
      • System Time
      • Port Settings
      • PoE
      • EEE
    • L2 Features
      • Link Aggregtion
      • STP
      • MAC Address Table
      • LLDP
      • IGMP Snooping
      • MLD Snooping
      • Jumbo Frame
    • VLAN
      • 802.1Q
      • PVID
      • Voice VLAN
    • Management
      • System Information
      • User Management
      • Dual Image
      • SNMP
    • ACL
      • MAC ACL
      • MAC ACE
      • IPv4 ACL
      • IPv4 ACE
      • IPv6 ACL
      • IPv6 ACE
      • ACL Binding
    • QoS
      • Global Settings
      • CoS Mapping
      • DSCP Mapping
      • Port Settings
      • Bandwidth Control
      • Storm Control
    • Security
      • 802.1x
      • Radius Server
      • Access
      • Port Security
      • Port Isolation
      • DoS
    • Monitoring
      • Port Statistics
      • RMON
      • Log
    • Diagnostics
      • Cable Diagnostics
      • Ping Test
      • IPv6 Ping Test
      • Trace Route
    • Maintenance
      • Configuration Manager
      • Firmware Upgrade
  • Appendix
    • Appendix A
    • Appendix B
    • Appendix C
Powered by GitBook
On this page
  • Background Scanning
  • Auto TX Power

Was this helpful?

Export as PDF
  1. Wireless Controller Features
  2. Device Management

Wireless Services

PreviousAP GroupsNextMonitor

Last updated 4 years ago

Was this helpful?

Background Scanning

With Background Scanning enabled, the controller periodically samples RF activity of all surrounding access points including channel utilization and nearby devices in all available channels. Background scanning is the basis for Auto Tx Power and Rogue AP detection, and must be enabled for these features to operate. If you prefer, you may disable it if you feel it's not helpful, or adjust the scanning frequency, if you prefer scanning at greater or fewer intervals.

Note: For latency-sensitive applications such as VoIP, it is recommended to set the background scan interval to a higher value, e.g. 5 or 10 minutes. For regular applications, the recommended value is 30 seconds. This value will also be directly related to how long it takes the AP to scan for rogue devices.

Auto TX Power

Using the information collected by Background Scanning, APs can automatically adjust their transmit power to optimize coverage. When enabled, APs will optimize their transmit power based on the time interval configured for Background Scanning.

Note: Background Scanning must be enabled, and Tx Power of APs must be set to Auto (under Wireless Radio Settings) for this feature to operate.