HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g
HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g
HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g
HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g
HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g

HP ProCurve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g

mpn: J8987A
product brand: HP
product condition: Used
excluding vat: £28.50
including vat: £34.20
information

HP Pro Curve Networking Wireless Access Point 530 WW J8987A RSVLC-0501 802.11b/g

In good condition and full working order
Comes with mounts and Power supply
In original box
Sold as seen in photos

Includes

  • 1 x HP Pro Curve Wireless Access Point 530 WW J8987A RSVLC-0501
  • 1 x Uk Mains Lead
  • 1 x AC Adapter - PSA18U-480C HP P/n : 5188-3767
  • 1 x User manual and Disc - 5070-1657
  • 1 x Wall mount kit - 5188-4682
Summary
The ProCurve Access Point 530 is an intelligent edge, dual-radio access point with simultaneous support for 802.11a and 802.11g standards, as well as dual 802.11g radio operation. The 530 access point offers a comprehensive range of industry-proven user authentication methods and the latest in standards-based wireless security to assure appropriate and secure access to network resources.
Technical Features
  • Neighbor access point (rogue AP) and ad-hoc wireless network detection
  • Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
  • Up to 16 BSSIDs per radio with separate VLAN, security and authentication
  • Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
  • Local RADIUS authentication
  • Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
  • RADIUS-based MAC authentication
  • RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
  • Local wireless bridge client traffic filtering
  • Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
  • Secure Sockets Layer
  • Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
  • Management VLAN
  • Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
  • Dual 802.11b/g radio operation
  • Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
  • IEEE 802.11h International Telecommunication Union (ITU) compliant
  • IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
  • International country configuration
  • International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
Technical Specifications
Networking
Communications
RFC 1350 TFTP PROTOCOL REVISION 2; RFC 854 Telnet; RFC 768 UDP; RFC 792 ICMP; RFC 793 TCP; RFC 826 ARP; RFC 1305 NTPv3; RFC 1157 A Simple Network Management Protocol (SNMP); IEEE 802.1D Spanning Tree; IEEE 802.11a High Speed Physical Layer in the 5 GHz Band; IEEE 802.11b Higher-Speed Physical Layer Extension in the 2.4 GHz Band; IEEE 802.11g Further Higher Data Rate Extension in the 2.4 GHz Band; RFC 2138 RADIUS; RFC 2865 Remote Authentication Dial In User Service (RADIUS); RFC 2866 RADIUS accounting; SSHv2 Secure Shell; IEEE 802.1X Network Login; IEEE 802.11i Medium Access Control (MAC) Security Enhancements; RFC 2104 Keyed-Hashing for Message Authentication; RFC 2459 Internet X.509 Public Key Infrastructure Certificate and CRL Profile; RFC 2868 RADIUS Attributes for Tunnel Protocol Support; RFC 2548 Microsoft Vendor-specific RADIUS Attributes; RFC 2869 RADIUS Extensions; RFC 3579 RADIUS Support For Extensible Authentication Protocol (EAP); RFC 2716 PPP EAP TLS Authentication Protocol; RFC 3394 Advanced Encryption Standard (AES) Key Wrap Algorithm; 802.3af Power over Ethernet; IEEE 802.1Q VLAN tagging; SNMPv1/v2; RFC 2233 The Interfaces Group MIB using SMIv2; RFC 3418 MIB for SNMP; HTML and telnet management; RFC 1493 Bridge MIB; RFC 1213 MIB II; RFC 3164 Syslog; RFC 791 IP; RFC 894 IP over Ethernet; RFC 1042 Transmission of IP Datagrams over IEEE 802 Networks; RFC 1541 DHCP; RFC 1945 Hypertext Transfer Protocol HTTP/1.0; RFC 2818 HTTP Over TLS; RFC 1321 The MD5 Message-Digest Algorithm
Memory and processor
16 MB Flash ROM memory; Processor: PowerPC MPC8248, 400 MHz
Ports
External I/O ports
1 10/100 ports (IEEE 802.3 Type 10Base-T, IEEE 802.3u Type 100Base-TX); 1 RS-232C DB-9 console port
Power
Power availability
0.260 A
Power consumption
12.5 W
Heat dissipation
43 BTU/hr
Power requirements
48 Vdc
System
1.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
2.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
3.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
4.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
5.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
6.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
7.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
8.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
9.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
10.
Neighbor access point (rogue AP) and ad-hoc wireless network detection
Neighbor access point (rogue AP) and ad-hoc wireless network detection: Periodic scanning is provided for neighboring access points and ad-hoc wireless networks. Information collected during the scan, including BSSID, SSID, channel, RSSI, security setting, and radio type 802.11a mode are captured for each wireless device detected. If configured, the access point can enter dedicated scan mode to provide continuous scanning of the surrounding RF environment.
Up to 16 BSSIDs per radio with separate VLAN, security and authentication
Up to 16 BSSIDs per radio with separate VLAN, security, and authentication: permits network administrators to control user access to network resources based on user authentication and level of trusted security between the client and access point
Local RADIUS authentication
Local RADIUS authentication : enables "enterprise-grade" 802.11i (WPA2) wireless security for small wireless LAN networks; serves as backup authentication in the event primary and secondary network RADIUS servers are unavailable due to network disruption. The local RADIUS authentication feature supports up to 100 user accounts.
RADIUS-based MAC authentication
RADIUS-based MAC authentication: a wireless client is authenticated with a RADIUS server based on the MAC address of the client; this is useful for clients that have minimal or no user interface
Local wireless bridge client traffic filtering
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices associated with the same access point
Secure Sockets Layer
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management interface of the access point
Management VLAN
Management VLAN: secures management access to the access point; the management VLAN is used to manage the access point through remote management tools such as the Web interface, SSH, telnet, or SNMP
Dual 802.11b/g radio operation
Dual 802.11b/g radio operation: provides high-capacity 802.11b/g data and voice wireless LAN coverage in networks where support for 802.11a is not a requirement
IEEE 802.11h International Telecommunication Union (ITU) compliant
IEEE 802.11h International Telecommunication Union (ITU) compliant: employs Dynamic Frequency Selection (DFS) and Transmit Power Control (TCP) to automatically select another channel and adjust transmit power to minimize interference with systems such as radar, if detected on that same channel
International country configuration
International country configuration: select the appropriate country, and the access point will automatically configure operation to match regulatory requirements
VAT IS NOT PAYABLE BY PURCHASERS OUTSIDE OF THE UK

CG 207513 - 2

specifications
  • MPN:
    J8987A

to request a price please fill out the form below...


close