Compex WP54AG User Manual

Page 13

Advertising
background image

2

F

F

E

E

A

A

T

T

U

U

R

R

E

E

S

S

A

A

N

N

D

D

B

B

E

E

N

N

E

E

F

F

I

I

T

T

S

S

The access point has been designed for high performance and offers a rich
suite of features, with which you should acquaint yourself to be able to exploit
your access point’s full potential.

x

x

W

W

i

i

r

r

e

e

l

l

e

e

s

s

s

s

D

D

i

i

s

s

t

t

r

r

i

i

b

b

u

u

t

t

i

i

o

o

n

n

S

S

y

y

s

s

t

t

e

e

m

m

(

(

W

W

D

D

S

S

)

)

This feature allows linking of several access points, virtually creating a larger
network infrastructure that allows mobile users to roam wirelessly, while still
being able to access network resources.

x

x

W

W

i

i

r

r

e

e

l

l

e

e

s

s

s

s

P

P

s

s

e

e

u

u

d

d

o

o

V

V

L

L

A

A

N

N

The unique Wireless Pseudo VLAN technology is a feature that allows wireless
clients to be segmented individually or into workgroups, thus blocking
access to another user’s/group’s PCs, and enhancing the privacy of the
wireless clients. This is especially useful in public hotspot deployment.

x

x

H

H

i

i

g

g

h

h

l

l

y

y

S

S

e

e

c

c

u

u

r

r

e

e

d

d

W

W

i

i

r

r

e

e

l

l

e

e

s

s

s

s

N

N

e

e

t

t

w

w

o

o

r

r

k

k

The access point supports the highest available wireless security standard:
Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-Personal for
SOHO users and WPA2-Enterprise for Enterprise users. The access point also
supports IEEE 802.1x for secure and centralized user-based authentication.
Wireless clients are thus required to authenticate through highly secure
methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to
the network.

x

x

S

S

m

m

a

a

r

r

t

t

S

S

e

e

l

l

e

e

c

c

t

t

This feature will automatically scan and recommend the best channel that
the access point can utilize.

x

x

u

u

C

C

o

o

n

n

f

f

i

i

g

g

U

U

t

t

i

i

l

l

i

i

t

t

y

y

The exclusive uConfig utility allows users to access the user-friendly Web
configuration interface of the access point without having to change the
TCP/IP setup of the workstation.

x

x

S

S

T

T

P

P

Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data paths into
a standby (blocked) state. If one network segment in the Spanning-Tree
Protocol becomes unreachable, or if Spanning-Tree Protocol costs change,
the spanning-tree algorithm reconfigures the spanning-tree topology and
re-establishes the link by activating the standby path.

Advertising