Ray’s Canopus is a tri-radio, Cloud Managed 2×2:2 802.11ac Wave 2 Outdoor access point with MU-MIMO support.

With a maximum concurrent data rate of 900 Mbps in the 5GHz band, 900 Mbps in the 5GHz band and 400 Mbps in the 2.4GHz band (for an aggregate peak data rate of 2.2 Gbps), this high performance Ray Access Point brings an always-on wireless network experience with the performance required for enterprises.

 

BUNDLE SERVICES AVAILABLE FOR

  • Mesh
    • Wi-Fi certified Easy Mesh & Wi-Fi SON
    • 1-touch Mesh Mode
    • Self-configuring, Self-managing & Self-healing
    • Dedicated Radio* for stellar Performance
  • Guest Wi-Fi
    • 9 Authentication Types & Built-in Design Templates
    • Built-in AAA (Radius) and Plan Management
    • Upload & Edit own Captive Portal Design
    • Achieve Regulatory Compliance
  • Vigil
    • Proactive Network Audit
    • Achieve continuous Regulatory Compliance
    • Enforce Company Policies
    • CISO Report
  • Intelligent RRM
    • Spectral scans provide Realtime RF view
    • Visualize AP Density, Radio events & Channel Occupancy
    • Automated RF Channel & Power Optimization
    • Mitigate co-channel interference & signal coverage problems

FEATURES & BENEFITS

The EYE focusses on two key Network important to an Enterprise. One is to give a Stellar Wi-Fi user experience and two is to Minimize IT support costs.

To provide a Wi-Fi experience that is quantifiably good, the key service-level thresholds such as time to connect, capacity, coverage, throughput, and uptime must be visible and measurable. KPI can then be set on these parameters to understand their adherence.

To Minimize IT support costs, Ray plays a two-part role. Based on the inputs, the system Proactively optimize performance and can Prioritize applications, resources, and users without manual intervention. Secondly, the AI driven Anomaly detection to automate triggers to capture wireless and wired packets. These are fed into event correlation engine to build a platform that acts as your in-house IT 24×7.

Industrial IoT (IIoT), enterprise IoT and Home IoT are witnessing a boom. The industrial IoT market is expected to grow at a CAGR of 16.7% from 2019 to 2027 to reach $263.4 billion by 2027. With IoT taking a centre stage and machines surpassing the humans, the security landscape changes from endpoint security to Security of Things (SoT).

Since most IoT devices use Wi-Fi to connect to the internet, Ray’s Cloud Managed wireless access point is at a strategic place to provide Security of Things (SoT) without any agent or network scanning.

Ray has a pre-built library of 1000s of IoT devices and it keeps growing. Ray uses Machine Learning to provide Real-time & continuous Vulnerability Assessment of IoT devices.

SoT security is a must in today’s times. The Security of Things (SoT) is when the daily physical devices are connected digitally and are embedded with internet connectivity sensors. The communication and control of these devices happen via the web. Data is transferred over a network via these devices and security of the data as well as the device is the primary concern.

With Machine Learning (ML), Ray takes responsibility of the security aspect and has an SoT library of 1000s of devices providing auto-learn signatures. In case of mishaps, Ray access points are notified with SoT anomaly detection and alerts. Upon threat detection, SoT can respond via Network Disconnect or Network Quarantine of the IoT device.

Proving the Moore’s perception that the number of transistors on a microchip doubles every two years, though the cost of computers is halved is right, the computational capabilities of wireless access points are increasing.

Ray has focused to ensure the decrease of overall TCO and increase in the lifetime value of a Ray wireless access point for the enterprise.

Ray has achieved this by opening the Ray operating system to application developers. This has led to apps like SD-WAN, VPN, attendance management, employee productivity etc. to be available on the Ray application store.

These apps are tested for their security, privacy, and performance against the stringent policies of Ray.

The SAAS nature of the application store ensures overall affordability whilst bringing extensibility to the Ray platform.

  • ChurnAlert protects ISP Investment
  • Eliminates Truck Rolls
  • Integrates with ISP BSS
  • Proactive Approach to customer complaints

Ray’s wireless access points are extremely ISP focused and have been designed keeping their struggles in mind.

The prices of internet are going down while the cost of providing high quality service are increasing. On one hand the Truck rolls, high installation costs and increasing service costs are driving the ISP costs higher and on the other hand, poor Quality of Experience and slow response to complaints are driving the customer to churn out.

Ray’s ChurnAlert uses Machine Learning to monitor 33 datapoints of CRM and Ray Platform to predict the customer Quality of Experience (QoE) and thereby the probability of customer churn from the ISP. These data points put the ISP on a front foot to provide proactive support whilst reducing the Truck rolls and reducing operation costs by 30% to 50%.

The 100% API availability and pre-defined integration points enable Ray to integrate with ISP BSS backend and provide a single unified platform for customer enablement and support.

Traditional enterprise wireless solutions are controller based or based on first generation cloud which are expensive to scale and difficult to manage. The roll outs of new features are slow are they not equipped for the modern-day enterprise which demands intelligence, reliability and performance from its network.

Ray’s cloud is microservices driven and architected on the enterprise stream processing platforms performing real-time data streaming. The deployment on Amazon Web Services (AWS) ensures multi-Availability Zone (AZ) ensuring high availability for mission critical enterprise networks.

The powerful cloud enables Ray to provide the most intelligent AI engine to drive features like EYE, Insights, ChurnAlert and Vigil taking network security, automation and user engagement to the next level.

End to End 256-bit encryption ensures security and privacy of enterprise data.

Ray has strived to ensure Simple and engaging User experience via intuitive UI design that reduces the learning curve whilst providing all the features expected of an Enterprise grade Wireless Access Point.

The API contains a set of tools known as endpoints for building software and applications that extend the Ray application data and statistics to enterprise applications or dashboard.

Ray has been true to the principle of being open by providing 100% API coverage. The API is very well documented and available to via the support portal of Ray.

All the API are modern and RESTful and use HTTPS requests to access and use data. The data is provided in a JSON human-readable format.

  • Manage Anytime, Anywhere
  • Android & IOS
  • Realtime alerts & Actionable Insights
  • Interactive Dashboards & key information always available

Enterprise networks of the day serve mission critical functions. Insights might be required at the middle of the night or during travel or even vacation.

Ray extends the cloud controller via the Ray Mobile Application to enable visualization of the enterprise network and all the key KPI from anywhere and anytime.

The Ray mobile app also provides real-time notifications and alerts to the IT Admins keeping them in loop with all network activities.

The Ray mobile app is available for both Android and IOS ecosystems ensuring full coverage.

Wireless Networks or Wi-Fi is the most preferred connectivity option for devices and things. It is also the preferred method used by hackers to hack into the enterprise network and steal sensitive data or to implant malware costing businesses millions in revenue loss along with loss of customer and market respect.

The most well-known Wireless attacks are Rouge AP and Evil Twin attacks.

Ray wireless access point creates a trusted and safe Wireless Environment by doing continuous and proactive RF scans while ensuring optimum wireless performance. Whenever it detects a Rouge AP or Evil Twin, a notification is sent to the IT Admin to ensure the same is mitigated.

60% of security breaches are caused due to human error. Ray enforces best practice templates in configuration to reduce the chances of misconfiguration or weak wireless configuration.

Ray’s outdoor wireless access point are made from industrial-grade components and are certified for IP67* rating. This makes the wireless access points highly resistant to temperature and weather conditions and ensure optimal performance even in adverse conditions.

These help to extend Wi-Fi outdoors by providing a highly scalable coverage to deliver solid connectivity even in rugged and hazardous locations.

The external antenna extends coverage providing great throughput.

The dedicated 3rd radio in several Ray outdoor wireless access points provides wireless connectivity in hard to reach places without need of a wireline internet connection.

Network Security is the need of the day. Most of the users use Wi-Fi as a preferred Internet connection method and Ray uses this strategic position in the network to provide key Insights to the enterprise.

TRay can monitor, categorize and block web traffic passing through the Wireless Access Point. The categorization definitions are kept in sync with the best security companies in the security space.

Ray goes a step further to monitor, categorize and block L7 applications through a world class DPI engine running on the Wi-Fi access point.

Additionally, Ray can Geo Segment the traffic to understand the destination of the traffic. Ray can also expose traffic to TOR sites, Crypto currency mining sites and IP with low reputation and/or blacklisted IP. This can expose security holes in the network.

Insights gives a peace of mind to the IT admin by providing a visual network overview.

Enterprises follow policies to enforce security, client compliance or to increase employee productivity. Statistically, 60% of security breaches are caused due to human error and hence pre-emptive policies help secure the enterprise network.

Ray provide enterprises with options to enforce policies directly on the wireless access points with regards to time, speed, content and Quota (Usage). The speed can be applied in absolute terms or as priority. Traffic categorization is done for both Web traffic as well as Application Layer or Layer 7(L7).

The IT Admins can also enforce BYOD policies to ensure rouge clients can’t connect to Wi-Fi network owing to weak or leaked passwords or open captive portals.

Guest networks are isolated from the enterprise network by network policies ensuring the safety of the network in case of a breach.

Enterprise policies can be applied per Individual, Group or SSID.

SPECIFICATIONS

AP
  • AP Type
    • Indoor, Tri radio, 2 x 5GHz 802.11ac 2×2 MIMO and 2.4GHz 802.11n 2×2 MIMO
WI-FI
  • Wi-Fi Standards
    • IEEE 802.11a/b/g/n/ac Wave 2
  • Supported Rates
    • 802.11b: 1, 2, 5.5, 11
    • 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54
    • 802.11n: 6.5 to 300 (MCS0 to MCS15)
    • 802.11ac: 6.5 to 433 (MCS0 to MCS9, NSS = 1 to 2)
    • 802.11n high-throughput (HT) support: HT20/40
    • 802.11ac very high throughput (VHT) support: VHT20/40/80
    • 802.11n/ac packet aggregation: A-MPDU, A-MSDU
  • Radio
    • 2.4 GHz 802.11b/g/n/ac client access radio
    • › 5 GHz 802.11a/n/ac Wave 2 client access radio
  • Supported Channels
    • 2.4GHz: 1-13
    • 5GHz: 36-64, 100-144, 149-165
  • MIMO
    • 2×2 SU-MIMO
    • 2×2 MU-MIMO
  • Spatial Streams
    • 2 SU-MIMO
    • 2 MU-MIMO
  • Radio Chains and Streams
    • 2×2:2
  • Channelization
    • 20, 40, 80MHz
  • Security
    • WPA-PSK
    • WPA-TKIP
    • WPA2 AES
    • 802.11x
    • Personal PSK
  • Peak PHY Rates
    • 2.4GHz: 300Mbps
    • 5GHz_(1): 867Mbps
    • 5GHz_(2): 867Mbps
  • SSID
    • Up to 31 per AP
  • Client Capacity
    • Up to 256 clients per AP
  • Supported Radio Technology
    • 802.11b: Direct-sequence spread-spectrum (DSSS)
    • 802.11a/g/n/ac: Orthogonal frequency-division multiplexing (OFDM)
  • Supported Modulation Types
    • 802.11b: BPSK, QPSK, CCK
    • 802.11a/g/n/ac: BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM
  • Wi-Fi Security
    • WIDS
  • Beamforming
    • Yes
NETWORKING
  • Mesh
    • SON based Mesh
  • IP
    • IPv4, IPv6
  • VLAN
    • 802.1Q (1 per BSSID or dynamic per use based on RADIUS)
    • VLAN Pooling
    • Port-based
  • 802.1x
    • Authenticator & Supplicant
  • MIMO
    • 2×2 SU-MIMO
    • 2×2 MU-MIMO
  • Tunnel
    • L2TP
    • GRE/EoGRE
    • Openvpn
    • L2TP/IPSEC
    • IKEv2
  • Policy Management Tools
    • Application Recognition and Control
    • Access Control Lists
    • Device Fingerprinting
    • Rate Limiting
    • Integrated Layer 7 Firewall with Mobile Device Policy Management
    • Flexible Guest Access with Device Isolation
  • Quality of Service
    • WMM Access Categories with DSCP and 802.1p Support
    • QoS-based Scheduling
    • Directed Multicast
    • L2/L3/L4 ACLs
  • Mobility
    • 802.11r for fast Layer 2 Roaming
    • Centralized Layer 3 Roaming
RF
  • Antenna
    • Integrated Omni-directional Antennae
  • Antenna Gain (max)
    • 3 dBi gain
  • Peak Transmit Power
    • ≤-25 DB
  • Operating Bands
    • 2.412-2.484 GHz
    • 5.150-5.250 GHz (UNII-1)
    • 5.250-5.350 GHZ (UNII-2)
    • 5.470-5.600, 5.660-5.725 GHz (UNII-2e)
    • 5.725-5.825 GHz (UNII-3)
RADIO MANAGEMENT
  • Antenna Optimization
    • Spatial Multiplexing
    • Cyclic-delay Diversity (CDD)
    • Low-density Parity Check (LDPC) Codes
    • Maximal Ratio Combining (MRC)
    • Space Time Block Code (STBC)
  • Wi-Fi Channel Management
    • Intelligent Radio Resource Management
  • Client Density Management
    • Adaptive Band Balancing
    • Client Load Balancing
    • Airtime Fairness
    • Airtime-based WLAN Prioritization
RF POWER
  • 2.4GHz
    • 802.11b 11M 23±2dBm 1M 25±2dBm
    • 802.11g 54M 22±2dBm 6M 24±2dBm
    • 802.11n HT20 MCS7 21±2dBm MCS0 23±2dBm
    • 802.11n HT40 MCS7 21±2dBm MCS0 23±2dBm
  • 5GHz
    • 802.11a 54M 19±2dBm 6M 21±2dBm
    • 802.11n HT20 MCS7 18±2dBm MCS0 20±2dBm
    • 802.11n HT40 MCS7 18±2dBm MCS0 20±2dBm
    • 802.11ac HT80 MCS9 17±2dBm MCS0 19±2dBm
RECEIVE SENSITIVITY
  • 2.4GHz
    • 802.11b 11M -85dBm 1M -94dBm
    • 802.11g 54M -72dBm 6M -90dBm
    • 802.11n HT20 MCS7 -70dBm MCS0 -88dBm
    • 802.11n HT40 MCS7 -68dBm MCS0 -86dBm
  • 5GHz
    • 802.11a 54M -72dBm 6M -90dBm
    • 802.11n HT20 MCS7 -70dBm MCS0 -88dBm
    • 802.11n HT40 MCS7 -68dBm MCS0 -86dBm
    • 802.11ac HT80 MCS9 -58dBm MCS0 -85dBm
PHYSICAL INTERFACES
  • Ethernet
    • 1x 10/100/1000 BASE-T Ethernet (RJ45)
    • 1x 10/100/1000 BASE-T Ethernet (RJ45) (Internal)
    • 1x DC Power Connector
    • Reset Button: Factory Reset (During Device Power Up)
PHYSICAL CHARACTERISTICS
  • Mounting
    • Wall, Drop Ceiling
POWER
  • DC Input 12V DC, 2A
    • 15W
  • 802.3at
    • 12W
WARRANTY
  • 1 Year Warranty

BLOG RECENT POST