Introduction
9
ProSafe Dual Band Wireless-N Access Point WNDAP360
Key Features
The ProSafe Dual Band Wireless-N Access Point WNDAP360 provides solid functionality,
including the following features:
• Dual Band
Concurrent. The wireless access point can operate in both the 2.4 GHz band
and the 5 GHz band concurrently.
The choice of bands is reflected in the protocol standard supported, as well as the
a
dministration screens that are displayed.
• Mul
tiple operating modes:
- W
ireless access point. Operates as a standard 802.11b/g/n or 802.11a/n wireless
access point.
- Point-to-point bridge. In th
is mode, the wireless access point communicates only
with another bridge-mode wireless station or wireless access point. Network
authentication should be used to protect this communication.
- Point-to-multipoint bridge. Sele
ct this only if this wireless access point is the master
for a group of bridge-mode wireless stations. The other bridge-mode wireless stations
send all traffic to this master, and do not communicate directly with each other.
Network authentication should be used to protect this traffic.
- Rep
eating the wireless signal. In this mode, the wireless access point does not
function as an access point for clients but functions only in point-to-multipoint bridge
mode to repeat the wireless signal and send all traffic to a remote access point.
Network authentication should be used to protect this communication.
• Hot
spot settings. You can allow all HTTP (TCP, port 80) requests to be captured and
redirected to the URL you specify.
• Upg
radeable firmware. Firmware is stored in a flash memory. You can upgrade it easily,
using only your Web browser, and you can upgrade it remotely. You can also use the
command-line interface.
• Rogue AP detectio
n. The Rogue AP filtering feature ensures that unknown APs are not
given access to any part of the LAN.
• Ac
cess control. The Access Control MAC address filtering feature can ensure that only
trusted wireless stations can use the wireless access point to gain access to your LAN.
• Security profil
es. When using multiple BSSIDs, you can configure unique security
settings (encryption, SSID, and so on) for each BSSID.
• Hidden m
ode. The SSID is not broadcast, assuring only clients configured with the
correct SSID can connect.
• Secure T
elnet command-line Interface. The secure Telnet command-line interface
(CLI) enables direct secure access over the serial port and easy scripting of configuration
of multiple wireless access points across an extensive network via the Ethernet interface.
A Secure Shell (SSH) client is required.
• Configuration
backup. Configuration settings can be backed up to a file and restored.
• Secure an
d economical operation. Adjustable power output allows more secure or
economical operation.