WSG1812X-PWR
WSG1812X-PWR Wireless Integrated Multi-Service Gateway is well designed and positioned for SMB network. It features gateway, security and AC function integration, reducing the number of devices and TCO in network. It adopts the innovative Comware V7 platform (referred to as V7 hereafter). V7 comes with the standard granular user control management, comprehensive RF resource management, 7×24 wireless security control, fast layer-2 and layer-3 roaming, strong QoS and IPv4/IPv6 dual stack. V7 adds in various novel wireless technologies such as multi-core control plane, Bonjour and Hotspot 2.0.
14,000,000 ₫ Giá gốc là: 14,000,000 ₫.13,500,000 ₫Giá hiện tại là: 13,500,000 ₫.
Mr Minh: - Kinh Doanh
Mr Luân: - Kinh Doanh
WhatsApp: - Tư Vấn Giải Pháp
Facebook: - Hỗ Trợ Đơn Hàng
Sales Engineer: - 0989 544 978
H3C WSG1812X-PWR Wireless Integrated Multi-Service Gateway
WSG1812X-PWR Datasheet
Model | WSG1812X-PWR |
---|---|
Dimensions (WxDxH) | 440*220*43.6mm |
Weight | 2.9kg |
Wireless throughput | 4Gbps |
Port | LAN:2*SFP Plus + 12*PoE+ WAN:2 GE 1*USB |
Power supplies | 100V AC~240V AC:50/60Hz |
PoE output budget | 12*PoE+, 150W whole machine |
Operating and storage temperature | 0℃~45℃/-40℃~70℃ |
Operating and storage relative humidity | 5%~95% |
Safety Compliance | UL 60950-1 CAN/CSA C22.2 No 60950-1 IEC 60950-1 EN 60950-1/A11 AS/NZS 60950 EN 60825-1 EN 60825-2 EN60601-1-2 FDA 21 CFR Subchapter J |
EMC | ETSI EN 300 386 V1.3.3:2005 EN 55024: 1998+ A1: 2001 + A2: 2003 EN 55022 :2006 VCCI V-3:2007 ICES-003:2004 EN 61000-3-2:2000+A1:2001+A2:2005 EN 61000-3-3:1995+A1:2001+A2:2005 AS/NZS CISPR 22:2004 FCC PART 15:2005 GB 9254:1998 GB/T 17618:1998 |
MTBF | ≥50000hours |
Basic functions | Number of managed APs by default: 32 ordinary AP or 64 wall-plate AP Maximum number of managed APs: 64 Maximum users of authentication: 1024 |
---|---|
802.11MAC | 802.11 Protocols The number of SSID of whole machine: 32 SSID hiding 11G protection 11n only Use number limit: Supported: SSID based, per RF based Keepalive Idle Multi-country code assignment Wireless user isolation: VLAN based wireless users 2-layer isolation and SSID based wireless user 2-layer isolation 20MHz/40MHz auto-switch in 40MHz mode Local forwarding: Local forwarding based on SSID+VLAN |
CAPWAP | Automatic AP registration AC discovery (DHCP option43, DNS) IPv6 tunnel Clock synchronization Assign basic AP network parameter through AC: Supported: Static IP, VLAN, connected AC address L2/L3 connection between AP and AC NAT traversal between AP and AC |
Roaming | Intra-AC, Inter-AP L2 and L3 roaming Inter-AC, Inter-AP L2 and L3 roaming |
GW Features | PPPoE NAT DDNS SSL VPN IPSEC VPN RIP GRE |
Access Control | Open system, Shared-Key WEP-64/128, dynamic WEP WPA,WPA2,WPA3 TKIP CCMP SSH v1.5/v2.0 Portal authentication: Supported: Remote Authentication, external server Portal page redirection: Supported: SSID based, AP Portal page push Portal by-pass Proxy 802.1x authentication: EAP-TLS, EAP-TTLS, EAP-PEAP, EAP-MD5, EAP-SIM, LEAP, EAP-FAST, EAP offload (TLS, PEAP only) Local authentication: 802.1X, Portal, MAC authentication LDAP authentication: 802.1X and Portal with EAP-GTC and EAP-TLS supported by 802.1X login AP location-based user access control Guest Access control VIP channel ARP attack detection: Supported: Wireless SAVI SSID anti-spoofing: SSID + user name binding AAA server selection based on SSID and domain AAA server back up Local AAA server for wireless user TACACS+ |
QoS | Priority mapping L2-L4 packet filtering and traffic classification Rate limit 802.11e/WMM Access control based on user profile Intelligent bandwidth limit (equal bandwidth share algorithm) Intelligent bandwidth limit (user specific) Intelligent bandwidth guarantee QoS Optimization for SVP phone CAC(Call Admission Control) End-to-end QoS AP upload speed limit |
RF management | Country code lock Static channel and power configuration Auto channel and power configuration Auto transmission rate adjustment Coverage hole detection and correction Load balancing: Supported: based on traffic, user & frequency (dual-frequency supported) Intelligent load balancing AP load balancing group: Supported: auto-discovery and flexible setting |
Security | Static blacklist Dynamic blacklist White list Rogue AP detection: Supported: SSID based, BSSID, device OUI Rouge AP countermeasure Flooding attack detection Spoof attack detection Weak IV attack detection WIPS/WIDS: Supported: 7-layer mobile security |
Layer 2 protocol | ARP (gratuitous ARP) 802.1p 802.1q: Maximum VLANs: 4094) 802.1x |
IP protocol | IPv4 protocol Native IPv6 IPv6 SAVI IPv6 Portal |
Multicast | MLD Snooping IGMP Snooping Multicast group: 256 Multicast to Unicast (IPv4, IPv6): Supported: Set unicast limit based on operating environment |
Redundancy | 1+1 failover between ACs Intelligent AP sharing among ACs Remote AP |
Management and deployment | Network management: WEB, SNMP v1/v2/v3, RMON Network deployment: WEB, CLI, Telnet, FTP |
Green features | Scheduled shutdown of AP RF interface Scheduled shutdown of wireless service Per-packet power adjustment (PPC) |
WLAN Application | RF Ping Remote probe analysis Packet forwarding fairness adjustment 802.11n packet forwarding suppression Access based traffic shaping Co-AP channel sharing Co-AP channel reuse RF interface transmission rate adjustment algorithm Drop wireless packet with weak signal Disable user access with weak signal Disable multicast packet caching Status blink(limited to some AP) |
New added features | Policy forwarding VLAN pool Bonjour gateway 802.11w 802.11k,v,r Hotspot2.0 (802.11u) NAT VPN |
Firewall | Attack protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood ASPF application layer packet filtering Basic and advanced ACLs Time range-based ACL User-based and application-based access control Static and dynamic blacklist function MAC-IP binding MAC-based ACL |
Antivirus | Signature-based virus detection Manual and automatic upgrade for the signature database Stream-based processing Virus detection based on HTTP, FTP, SMTP, and POP3 Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Virus Virus logs and reports Signature-based virus detection |
Deep intrusion prevention | Prevention against common attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification) Manual and automatic upgrade for the attack signature database (TFTP and HTTP). P2P/IM traffic identification and control |
Email/webpage/application layer filtering | Email filtering SMTP email address filtering Email subject/content/attachment filtering Webpage filtering HTTP URL/content filtering Java blocking ActiveX blocking SQL injection attack prevention |
VPN | L2TP VPN IPSec VPN GRE VPN SSL VPN |
NAT | Many-to-one NAT, which maps multiple internal addresses to one public address Many-to-many NAT, which maps multiple internal addresses to multiple public addresses One-to-one NAT, which maps one internal address to one public address NAT of both source address and destination address External hosts access to internal servers Internal address to public interface address mapping NAT support for DNS Setting effective period for NAT NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP |
There are no reviews yet.