Ray’s R6A – M is a dual-concurrent, cloud-managed Wi-Fi 6 (802.11ax) access point with 2X2:2 MU-MIMO, OFDMA and 1024 QAM.

Its 1.8 Gbps – maximum speed is ideal for ‘Work from Home’ times, where home is your office. With every other device at home like smart watches, sound-bars, tabs, etc. and devices used at work laptops, cell phones, PCs also connected to the Wi-Fi network R6A – M frees you from all the congestion caused by so many connected devices to the same network. Online classes, Zoom meetings, heavy file downloads, etc. moves smoothly with the R6A – M platform.

It easily manages through physical, virtual and cloud management options.

BUNDLE SERVICES AVAILABLE FOR

  • Intelligent RRM
    • Spectral scans provide Real-time RF view
    • Visualize AP Density, Radio Events & Channel Occupancy
    • Automated RF Channel & Power Optimization
    • Mitigate Co-channel Interference & Signal Coverage problems
  • EYE
    • KPI Configuration, Monitoring & Visualization
    • Automatic Actions to meet KPI Goals
    • Proactive & Correlated Root Cause Analysis
    • Dynamic Packet Capture for Troubleshooting
  • Enterprise Policies
    • Granularize policies per Individual, Group or SSID
    • Enforce Time, Speed, Quota & Content Policies
    • Categorize traffic into High, Medium & Low priorities
    • Layer 7 Application Control and Shaping
    • Enforce BYOD policies
  • Insights
    • Web Traffic Monitoring & Categorization
    • Application (L7) Traffic Monitoring & Categorization
    • Geo Segmentation of Traffic
    • TOR, Crypto & Blacklisted IP Alert

FEATURES & BENEFITS

Industrial IoT (IIoT), enterprise IoT and Home IoT are witnessing a boom. The industrial IoT market is expected to grow at a CAGR of 16.7% from 2019 to 2027 to reach $263.4 billion by 2027. With IoT taking a centre stage and machines surpassing the humans, the security landscape changes from endpoint security to Security of Things (SoT).

Since most IoT devices use Wi-Fi to connect to the internet, Ray’s cloud managed wireless access point is at a strategic place to provide Security of Things (SoT) without any agent or network scanning.

Ray has a pre-built library of 1000s of IoT devices and it keeps growing. Ray uses Machine Learning to provide Real-time & continuous Vulnerability Assessment of IoT devices.

SoT security is a must in today’s times. The Security of Things (SoT) is when the daily physical devices are connected digitally and are embedded with internet connectivity sensors. The communication and control of these devices happen via the web. Data is transferred over a network via these devices and security of the data as well as the device is the primary concern.

With Machine Learning (ML), Ray takes responsibility of the security aspect and has an SoT library of 1000s of devices providing auto-learn signatures. In case of mishaps, Ray access points are notified with SoT anomaly detection and alerts. Upon threat detection, SoT can respond via Network Disconnect or Network Quarantine of the IoT device.

The growth in connected devices and streaming services that rely on Wi-Fi connectivity has resulted in the need for smarter Wi-Fi networks that provide extended, uniform coverage across places that have no wired connectivity.

Ray uses Wi-Fi Alliance certified Wi-Fi EasyMesh and Qualcomm Wi-Fi SON to employ multiple access points that work together to form a unified network that provides smart, efficient Wi-Fi throughout the indoor and outdoor spaces.

The easy setup delivers automatic device onboarding and configuration while the flexible design allows for best placement of multiple APs providing extended courage.

The Ray wireless access points are self-managing and self-optimizing. It collects network information and responds to changes in the network conditions to maximize performance.

The Ray wireless access points use effective load balancing to guide the devices to roam to the best connection and avoid interference.

Several Ray access points use a dedicated 3rd Radio to provide Mesh wireless backhaul thereby increasing the Mesh performance.

Ray enables enterprises to build a custom Wi-Fi experience by creating elegant, responsive, mobile-friendly captive portals with Ray’s built-in customizable templates which are multi-lingual, responsive and require zero coding. The captive portals can be customized as per your Brand name, colours, etc. and help in making a brand visible.

The built-in targeting engine gives a personalized option driven by location, user device, engagement ratio and other audience metrics.

Ray bundles Advertisement server, which delivers campaigns to a captive audience with targeted static and dynamic picture and video content.

Ray Survey Engine adds surveys for deep visitor understanding and engagement.

The Analytics Dashboards provides actionable insights like impressions, clicks, survey data, user location, dwell time etc.

The Ray Captive Portal has built in AAA (Radius) and advance plan management to make it a complete solution. It can also connect to external Captive Portals.

The Built-in Security Rules and Network Policies ensure that the guest network is isolated from the Enterprise Network.

Ray complies with country specific norms for storage of IP logs.

  • ChurnAlert protects ISP Investment
  • Eliminates Truck Rolls
  • Integrates with ISP BSS
  • Proactive Approach to customer complaints

Ray’s wireless access points are extremely ISP focused and have been designed keeping their struggles in mind.

The prices of internet are going down while the cost of providing high quality service are increasing. On one hand the Truck rolls, high installation costs and increasing service costs are driving the ISP costs higher and on the other hand, poor Quality of Experience and slow response to complaints are driving the customer to churn out.

Ray’s ChurnAlert uses Machine Learning to monitor 33 datapoints of CRM and Ray Platform to predict the customer Quality of Experience (QoE) and thereby the probability of customer churn from the ISP. These data points put the ISP on a front foot to provide proactive support whilst reducing the Truck rolls and reducing operation costs by 30% to 50%.

The 100% API availability and pre-defined integration points enable Ray to integrate with ISP BSS backend and provide a single unified platform for customer enablement and support.

Traditional enterprise wireless solutions are controller based or based on first generation cloud which are expensive to scale and difficult to manage. The roll outs of new features are slow are they not equipped for the modern-day enterprise which demands intelligence, reliability and performance from its network.

Ray’s cloud is microservices driven and architected on the enterprise stream processing platforms performing real-time data streaming. The deployment on Amazon Web Services (AWS) ensures multi-Availability Zone (AZ) ensuring high availability for mission critical enterprise networks.

The powerful cloud enables Ray to provide the most intelligent AI engine to drive features like EYE, Insights, ChurnAlert and Vigil taking network security, automation and user engagement to the next level.

End to End 256-bit encryption ensures security and privacy of enterprise data.

Ray has strived to ensure Simple and engaging User experience via intuitive UI design that reduces the learning curve whilst providing all the features expected of an Enterprise grade Wireless Access Point.

  • Proactive Network Audit
  • Achieve continuous Regulatory Compliance
  • Enforce Company Policies
  • CISO Report

A study by Clark School mentions a hacker attack every 39 seconds leading to losses in tunes of billions of dollars directly and indirectly.

Security policies, network audits and government compliances are in place to pre-empt, stop or control cyberthreats. However, statistically, 77% of organizations do not have a Cyber Security Incident Response plan.

Ray wireless access point provide a simpler yet effective tool to enterprises. The proactive Network audit keeps monitoring the traffic continuously for anomalies, insecure protocols, traffic to blacklisted IP etc. and takes automated actions to quarantine the device or alert the user.

Ray also continuously monitors compliance with network policies for standards such as FFIEC, GDPR, HIPAA, PCI DSS, and SOC2 and provides audit-ready reports and alerts in case of non-compliance.

A weekly CISO report summarizes the network activities of the past week saving precious time of executives and focus on just the actionable.

Ray’s outdoor wireless access point are made from industrial-grade components and are certified for IP67* rating. This makes the wireless access points highly resistant to temperature and weather conditions and ensure optimal performance even in adverse conditions.

These help to extend Wi-Fi outdoors by providing a highly scalable coverage to deliver solid connectivity even in rugged and hazardous locations.

The external antenna extends coverage providing great throughput.

The dedicated 3rd radio in several Ray outdoor wireless access points provides wireless connectivity in hard to reach places without need of a wireline internet connection.

The API contains a set of tools known as endpoints for building software and applications that extend the Ray application data and statistics to enterprise applications or dashboard.

Ray has been true to the principle of being open by providing 100% API coverage. The API is very well documented and available via the support portal of Ray.

All the API are modern and RESTful and use HTTPS requests to access and use data. The data is provided in a JSON human-readable format.

Wireless Networks or Wi-Fi is the most preferred connectivity option for devices and things. It is also the preferred method used by hackers to hack into the enterprise network and steal sensitive data or to implant malware costing businesses millions in revenue loss along with loss of customer and market respect.

The most well-known Wireless attacks are Rouge AP and Evil Twin attacks.

Ray wireless access point creates a trusted and safe Wireless Environment by doing continuous and proactive RF scans while ensuring optimum wireless performance. Whenever it detects a Rouge AP or Evil Twin, a notification is sent to the IT Admin to ensure the same is mitigated.

60% of security breaches are caused due to human error. Ray enforces best practice templates in configuration to reduce the chances of misconfiguration or weak wireless configuration.

  • Manage Anytime, Anywhere
  • Android & IOS
  • Realtime alerts & Actionable Insights
  • Interactive Dashboards & key information always available

Enterprise networks of the day serve mission critical functions. Insights might be required at the middle of the night or during travel or even vacation.

Ray extends the cloud controller via the Ray Mobile Application to enable visualization of the enterprise network and all the key KPI from anywhere and anytime.

The Ray mobile app also provides real-time notifications and alerts to the IT Admins keeping them in loop with all network activities.

The Ray mobile app is available for both Android and IOS ecosystems ensuring full coverage.

Proving the Moore’s perception that the number of transistors on a microchip doubles every two years, though the cost of computers is halved is right, the computational capabilities of wireless access points are increasing.

Ray has focused to ensure the decrease of overall TCO and increase in the lifetime value of a Ray wireless access point for the enterprise.

Ray has achieved this by opening the Ray operating system to application developers. This has led to apps like SD-WAN, VPN, attendance management, employee productivity etc. to be available on the Ray application store.

These apps are tested for their security, privacy, and performance against the stringent policies of Ray.

The SAAS nature of the application store ensures overall affordability whilst bringing extensibility to the Ray platform.

SPECIFICATIONS

AP
  • Wi-Fi Standards
    • 802.11 ax/ac/b/g/n
WI-FI
  • AP Type
    • Mesh, dual radio, 5GHz and 2.4GHz 802.11ax 2×2 MIMO
  • Wi-Fi 6 (802.11ax) Features
    • UL/DL-OFDMA
    • Target Wake Time (TWT)
    • Spatial Frequency Reuse (BSS Coloring)
  • Radio
    • 2.4 GHz 802.11 ax/ac/b/g/n client access radio
    • 5 GHz 802.11 ax/ac/b/g/n client access radio
  • Max aggregate frame rate
    • Max aggregate frame rate: 1.8 Gbps
    • 2.4GHz: 574 Mbps
    • 5GHz: 1201 Mbps
  • Supported data rates (Mbps)
    • 802.11b: 1, 2, 5.5, 11
    • 802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54
    • 802.11n: 6.5 to 300 (MCS0 to MCS15, HT20 to HT40), 400 with 256-QAM
    • 802.11ac: 6.5 to 867 (MCS0 to MCS9, NSS = 1 to 2, VHT20 to VHT80), 1,083 with 1024-QAM
    • 802.11ax (2.4GHz): 3.6 to 574 (MCS0 to MCS11, NSS = 1 to 2, HE20 to HE40)
    • 802.11ax (5GHz): 3.6 to 1,201 (MCS0 to MCS11, NSS = 1 to 2, HE20 to HE80)
  • Supported frequency bands (country-specific restrictions apply)
    • Supported frequency bands
      (country-specific restrictions apply) :
    • 2.412-2.484 GHz
    • 5.150-5.250 GHz (UNII-1)
    • 5.250-5.350 GHZ (UNII-2)
    • 5.470-5.600, 5.660-5.725 GHz (UNII-2e)
    • 5.725-5.850 GHz (UNII-3)
  • Supported Channels
    • Available channels dependent on configured regulatory domain
    • 2.4GHz: 1-13
    • 5GHz: 36-64, 100-144, 149-165
  • MIMO
    • 2×2 SU-MIMO
    • 2×2 MU-MIMO
  • Radio Chains and Spatial Streams
    • 2×2:2 streams SU/MU MIMO 5GHz
    • 2×2:2 streams SU/MU MIMO 2.4GHz
  • Channelization
    • 802.11n high-throughput (HT) support: HT20/40
    • 802.11ac very high throughput (VHT) support: VHT20/40/80
    • 802.11ax high efficiency (HE) support: HE20/40/80
  • Security
    • WEP, WPA, WPA2-PSK, WPA2-Enterprise with 802.1X, WPA3 – Personal, WPA3 – Enterprise, WPA3 – Enhanced Open (OWE)
    • Personal PSK
    • EAP-TLS, EAP-TTLS, EAP MSCHAPv2, EAP-SIM
  • Wireless Security
    • Real-time WIDS/WIPS with instant alerting
  • Supported radio technologies
    • 802.11b: Direct-sequence spread-spectrum (DSSS)
    • 802.11a/g/n/ac: Orthogonal frequency-division multiplexing (OFDM)
    • 802.11ax: Orthogonal frequency-division multiple access (OFDMA) with up to 8 resource units
  • Supported modulation types
    • 802.11b: BPSK, QPSK, CCK
    • 802.11a/g/n: BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM (proprietary extension)
    • 802.11ac: BPSK, QPSK, 16-QAM, 64-QAM, 256-QAM, 1024-QAM (proprietary extension)
  • Beamforming
    • Transmit Beamforming and Maximal Ratio Combining
  • Mesh
    • SON based Mesh
RADIO MANAGEMENT
  • Antenna Optimization
    • Polarization Diversity with Maximal Ratio Combining (PDMRC).
  • Wi-Fi Channel Management
    • Intelligent Radio Resource Management (iRRM)
  • Client Density Management
    • Adaptive Band Balancing
    • Client Load Balancing
    • Airtime Fairness
    • Airtime-based WLAN Prioritization
RF PERFORMANCE
  • Antenna
    • 2.4GHz omni-directional antennas with 3 dBi peak gain
    • 5GHz omni-directional antennas with 6 dBi peak gain
  • Peak Transmit Power (Tx port/chain + Combining gain)
    • Maximum (aggregate, conducted total) transmit power (limited by local regulatory requirements)
    • 2.4 GHz band: 26 dBm
    • 5 GHz band: 25 dBm
  • Transmit power
    • Configurable in increments of 0.5 dBm
PERFORMANCE
  • Maximum number of associated client devices
    • Up to 256 associated client devices per radio
    • Up to 512 clients per AP
  • Maximum number of BSSIDs
    • 16 BSSIDs per radio
    • Up to 31 per AP
NETWORKING
  • IP
    • IPv4, IPv6, dual stack
  • VLAN
    • 802.1Q (1 per BSSID or dynamic per user based on RADIUS)
    • VLAN Pooling
    • Port-based
  • 802.1x
    • Authenticator & Supplicant
  • Tunnel
    • L2TP
    • GRE/EoGRE
    • Openvpn
    • L2TP/IPSEC
  • Policy Management Tools
    • Application Recognition and Control
    • Access Control Lists
    • Device Fingerprinting
    • Rate Limiting
    • Integrated Layer 7 firewall with mobile device policy management
    • Flexible guest access with device isolation
  • Quality of Service
    • WMM Access Categories with DSCP and 802.1p support
    • QoS-based scheduling
    • Directed Multicast
    • L2/L3/L4 ACLs
  • Mobility
    • 802.11r for fast Layer 2 roaming
    • Centralized Layer 3 roaming
PHYSICAL INTERFACES
  • Ethernet (WAN)
    • 1x 10/100/1000 BASE-T Ethernet (RJ45) · LLDP
  • Ethernet (LAN)
    • 2x 10/100/1000 BASE-T Ethernet (RJ45) LLDP
  • DC Power
    • 1x DC power connector
  • Reset Button
    • Reset to the factory default settings
  • Indicators
    • One multi-color status LED
PHYSICAL
  • Physical Size
    • 19.8 cm (L)
    • 19. 8 cm (W)
    • 4.1 cm (H)
  • Weight
    • 700 g
  • Mounting
    • Desk
ENVIRONMENT
  • Operating temperature
    • -20~45 ℃
  • Humidity
    • 5%~95% non-condensing
  • Storage Temperature
    • -0~70 ℃
  • Storage Humidity
    • 5%~95% non-condensing
POWER
  • DC Adaptor (12V, 2.0A, 24W)
    • 12 W
WARRANTY
    • Limited Lifetime Warranty
BOX CONTENTS
    • Power Adaptor
    • Ethernet Cable
    • Quick Start Guide

BLOG RECENT POST