ProSafe Dual Band Wireless-N Access Point WNDAP360
Key Features
The ProSafe Dual Band Wireless-N Access Point WNDAP360 provides solid functionality,
including the following features:
•
Dual Band Concurrent. The wireless access point can operate in both the 2.4 GHz band
and the 5 GHz band concurrently.
The choice of bands is reflected in the protocol standard supported, as well as the
administration screens that are displayed.
•
Multiple operating modes:
-
Wireless access point. Operates as a standard 802.11b/g/n or 802.11a/n wireless
access point.
-
Point-to-point bridge. In this mode, the wireless access point communicates only
with another bridge-mode wireless station or wireless access point. Network
authentication should be used to protect this communication.
-
Point-to-multipoint bridge. Select this only if this wireless access point is the master
for a group of bridge-mode wireless stations. The other bridge-mode wireless stations
send all traffic to this master, and do not communicate directly with each other.
Network authentication should be used to protect this traffic.
-
Repeating the wireless signal. In this mode, the wireless access point does not
function as an access point for clients but functions only in point-to-multipoint bridge
mode to repeat the wireless signal and send all traffic to a remote access point.
Network authentication should be used to protect this communication.
•
Hotspot settings. You can allow all HTTP (TCP, port 80) requests to be captured and
redirected to the URL you specify.
•
Upgradeable firmware. Firmware is stored in a flash memory. You can upgrade it easily,
using only your Web browser, and you can upgrade it remotely. You can also use the
command-line interface.
•
Rogue AP detection. The Rogue AP filtering feature ensures that unknown APs are not
given access to any part of the LAN.
•
Access control. The Access Control MAC address filtering feature can ensure that only
trusted wireless stations can use the wireless access point to gain access to your LAN.
•
Security profiles. When using multiple BSSIDs, you can configure unique security
settings (encryption, SSID, and so on) for each BSSID.
•
Hidden mode. The SSID is not broadcast, assuring only clients configured with the
correct SSID can connect.
•
Secure Telnet command-line Interface. The secure Telnet command-line interface
(CLI) enables direct secure access over the serial port and easy scripting of configuration
of multiple wireless access points across an extensive network via the Ethernet interface.
A Secure Shell (SSH) client is required.
•
Configuration backup. Configuration settings can be backed up to a file and restored.
•
Secure and economical operation. Adjustable power output allows more secure or
economical operation.
Introduction
9