H3C WSG1808X-PWR Wireless Integrated Multi-Service Router Gateway
รหัสสินค้า : H3C WSG1808X-PWR
ราคา |
14,900.00 บาท |
จำนวนที่จะซื้อ | |
ราคารวม | 14,900.00 บาท |
สินค้าไม่เพียงพอ
สินค้าหมด
H3C WSG1808X-PWR 10-Port (9*1000BASE-T and 1*SFP Plus) Integrated Multi-Service Router Gateway
Model: H3C WSG1812X-PWR
ดาวน์โหลดเอกสาร สเปค Datasheet คู่มือ ติดตั้งใช้งาน
H3C WSG1812X-PWR Datasheet Download
H3C WSG1808X-PWR Wireless Integrated Services Gateway Installation Guide
ทางร้านเป็นตัวแทนแต่งตั้ง จากทาง H3C Authorized Thailand
มีราคาพิเศษ งานโครงการ ช่าง ร้านค้า ผู้รับเหมา และออกเอกสารงานโครงการ
พร้อมบริการ แนะนำติดตั้ง ใช้งาน เซ็ต ตั้งค่า ทดสอบเบื้องต้นให้
ติดต่อสอบถามทักไลน์ 0897993376
Hardware Specifications
WAN Port :2*GE
LAN Port:7*GE PoE plus+ 1*SFP+
Notes : All ports are LAN/WAN switchable. WAN ports are the 8th and the 9th port; the 10th port is SFP+ port
1*Console
Wireless throughput : 2Gbps
Power supplies : Power adapter
Software specifications
Item
Feature
WSG1808X-PWR
Basic functions
Number of managed APs by default
12 ordinary APs or 24 wall-plate APs Maximum number of managed AP 24
(Notes: 1 license per ordinary AP, 0.5 license per wall-plate AP, but 24 APs at most)
Maximum users of authentication 102
802.11MAC 802.11 Protocols The number of SSID of whole machine 24 SSID hiding 11G protection 11n only
Use number limit Supported: SSID based, per RF based Keepalive Idle Multi-country code assignment Wireless user isolation
Supported:
VLAN based wireless users 2-layer isolation
SSID based wireless user 2-layer isolation
20MHz/40MHz auto-switch in 40MHz mode
Local forwarding Local forwarding based on SSID+VLAN
CAPWAP Automatic AP registration
AC discovery (DHCP option43, DNS)
IPv6 tunnel Clock synchronization Jumbo frame forwarding
Assign basic AP network parameter through AC
Supported: Static IP, VLAN, connected AC address
L2/L3 connection between AP and AC
NAT traversal between AP and AC Roaming
Intra-AC, Inter-AP L2 and L3 roamin
GW Feature NAT PPPoE DDNS SSL VPN
IPSEC VPN RIP GRE
Access control
Open system, Shared-Key
WEP-64/128, dynamic WEP WPA, WPA2, WPA3, TKIP, CCMP, (11n recommended)
SSH v1.5/v2.0, Portal authentication
Supported: Remote Authentication, external server
Portal page redirection, Supported: SSID based, AP Portal page push
Portal by-pass Proxy, 802.1x authentication
EAP-TLS, EAP-TTLS, EAP-PEAP, EAP-MD5, EAP-SIM, LEAP, EAP-FAST, EAP offload (TLS, PEAP only)
Local authentication, 802.1X, Portal, MAC authentication, LDAP authentication, 802.1X and Portal
EAP-GTC and EAP-TLS supported by 802.1X login, AP location-based user access control
Guest Access control, VIP channel, ARP attack detection
Supported: Wireless SAVI, SSID anti-spoofing, SSID + user name binding
AAA server selection based on SSID and domain, AAA server back up, Local AAA server for wireless user, TACACS+
QoS, Priority mapping, L2-L4 packet filtering and traffic classification, Rate limit
Supported with granularity of 8Kbps, 802.11e/WMM, Access control based on user profile
Intelligent bandwidth limit (equal bandwidth share algorithm), Intelligent bandwidth limit (user specific)
Intelligent bandwidth guarantee, Supported: Free flow for packets coming from every SSID When traffic is not congested, and guarantee a minimum bandwidth for each SSID when traffic is congested, QoS Optimization for SVP phone
CAC (Call Admission Control), Supported: based on user number/bandwidth
End-to-end QoS, AP upload speed limit, RF management, Country code lock
Static channel and power configuration, Auto channel and power configuration
Auto transmission rate adjustment, Coverage hole detection and correction
Load balancing, Supported: based on traffic, user & frequency (dual-frequency supported), Intelligent load balancing, AP load balancing group, Supported: auto-discovery and flexible setting
Security
Static blacklist, Dynamic blacklist, White list, Rogue AP detection
Supported: SSID based, BSSID, device OUI, Rouge AP countermeasure, Flooding attack detection, Spoof attack detection
Weak IV attack detection, WIPS/WIDS, Supported: 7-layer mobile security, Layer 2 protocol, ARP (gratuitous ARP)
802.1p, 802.1q (Maximum VLANs: 4094), 802.1x
IP protocol
IPv4 protocol, Native IPv6, IPv6 SAVI, IPv6 Portal, Multicast, MLD Snooping, IGMP Snoopin, Multicast group, Multicast to Unicast (IPv4, IPv6), Supported: Set unicast limit based on operating environment
Redundancy
1+1 failover between ACs, Intelligent AP sharing among AC, Remote AP, Management and deployment
Network management
WEB, SNMP v1/v2/v3, RMON, Network deployment, WEB, CLI, Telnet, FTP
Green features
Scheduled shutdown of AP RF interface, Scheduled shutdown of wireless service, Per-packet power adjustment (PPC)
WLAN Application
RF Ping, Remote probe analysis, Packet forwarding fairness adjustment, 802.11n packet forwarding suppression
Access based traffic shaping, Co-AP channel sharing, Co-AP channel reuse, RF interface transmission rate adjustment algorithm
Drop wireless packet with weak signal, Disable user access with weak signal, Disable multicast packet caching
Status blink (limited to some AP). New added features, Policy forwarding, VLAN pool, Bonjour gateway, 802.11w, 802.11k, v
Hotspot2.0 (802.11u), NAT, VPN
Firewall
Attack protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood, ASPF application layer packet filtering, Basic and advanced ACLs, Time range-based ACL, User-based and application-based
Antivirus
Signature-based virus detection
Manual and automatic upgrade for the signature database, Stream-based processin
Virus detection based on HTTP, FTP, SMTP, and POP3
Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Viru
Virus logs and reports, Signature-based virus detection, Deep intrusion prevention
Prevention against common attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass
Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification)
Manual and automatic upgrade for the attack signature database (TFTP and HTTP)., P2P/IM traffic identification and control
Email/webpage/application layer filtering, HTTP URL/content filtering
VPN
L2TP VPN, IPSec VPN, GRE VPN, SSL VPN, NAT
Many-to-one NAT, which maps multiple internal addresses to one public address
Many-to-many NAT, which maps multiple internal addresses to multiple public addresses
One-to-one NAT, which maps one internal address to one public address, NAT of both source address and destination address
External hosts access to internal servers, Internal address to public interface address mapping, NAT support for DNS
Setting effective period for NAT, NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP