H3C WSG1808X-PWR Wireless Integrated Multi-Service Router Gateway

รหัสสินค้า : H3C WSG1808X-PWR

ราคา

14,900.00 บาท

จำนวนที่จะซื้อ
ราคารวม 14,900.00 บาท

สินค้าไม่เพียงพอ

สินค้าหมด

H3C WSG1808X-PWR 10-Port (9*1000BASE-T and 1*SFP Plus)  Integrated Multi-Service Router Gateway

Model: H3C WSG1812X-PWR

ดาวน์โหลดเอกสาร สเปค Datasheet คู่มือ ติดตั้งใช้งาน

H3C WSG1812X-PWR Datasheet Download

H3C WSG1808X-PWR Wireless Integrated Services Gateway Installation Guide

ทางร้านเป็นตัวแทนแต่งตั้ง จากทาง H3C Authorized Thailand

มีราคาพิเศษ งานโครงการ ช่าง ร้านค้า ผู้รับเหมา และออกเอกสารงานโครงการ

พร้อมบริการ แนะนำติดตั้ง ใช้งาน เซ็ต ตั้งค่า ทดสอบเบื้องต้นให้

ติดต่อสอบถามทักไลน์ 0897993376

WSG1808X-PWR.jpg

Hardware Specifications

WAN Port :2*GE

LAN Port:7*GE PoE plus+ 1*SFP+

Notes : All ports are LAN/WAN switchable. WAN ports are the 8th and the 9th port; the 10th port is SFP+ port

1*Console

Wireless throughput : 2Gbps

Power supplies : Power adapter


Software specifications

Item

Feature

WSG1808X-PWR

Basic functions

Number of managed APs by default

12 ordinary APs or 24 wall-plate APs Maximum number of managed AP 24

(Notes: 1 license per ordinary AP, 0.5 license per wall-plate AP, but 24 APs at most)

Maximum users of authentication 102

802.11MAC 802.11 Protocols The number of SSID of whole machine 24 SSID hiding 11G protection 11n only

Use number limit Supported: SSID based, per RF based Keepalive Idle Multi-country code assignment Wireless user isolation

Supported:

VLAN based wireless users 2-layer isolation

SSID based wireless user 2-layer isolation

20MHz/40MHz auto-switch in 40MHz mode

Local forwarding Local forwarding based on SSID+VLAN

CAPWAP Automatic AP registration

AC discovery (DHCP option43, DNS)

IPv6 tunnel Clock synchronization Jumbo frame forwarding

Assign basic AP network parameter through AC

Supported: Static IP, VLAN, connected AC address

L2/L3 connection between AP and AC

NAT traversal between AP and AC Roaming

Intra-AC, Inter-AP L2 and L3 roamin

GW Feature NAT PPPoE DDNS SSL VPN

IPSEC VPN RIP GRE

Access control

Open system, Shared-Key

WEP-64/128, dynamic WEP WPA, WPA2, WPA3, TKIP, CCMP, (11n recommended)

SSH v1.5/v2.0, Portal authentication

Supported: Remote Authentication, external server

Portal page redirection, Supported: SSID based, AP Portal page push

Portal by-pass Proxy, 802.1x authentication

EAP-TLS, EAP-TTLS, EAP-PEAP, EAP-MD5, EAP-SIM, LEAP, EAP-FAST, EAP offload (TLS, PEAP only)

Local authentication, 802.1X, Portal, MAC authentication, LDAP authentication, 802.1X and Portal

EAP-GTC and EAP-TLS supported by 802.1X login, AP location-based user access control

Guest Access control, VIP channel, ARP attack detection

Supported: Wireless SAVI, SSID anti-spoofing, SSID + user name binding

AAA server selection based on SSID and domain, AAA server back up, Local AAA server for wireless user, TACACS+

QoS, Priority mapping, L2-L4 packet filtering and traffic classification, Rate limit

Supported with granularity of 8Kbps, 802.11e/WMM, Access control based on user profile

Intelligent bandwidth limit (equal bandwidth share algorithm), Intelligent bandwidth limit (user specific)

Intelligent bandwidth guarantee, Supported: Free flow for packets coming from every SSID When traffic is not congested, and guarantee a minimum bandwidth for each SSID when traffic is congested, QoS Optimization for SVP phone

CAC (Call Admission Control), Supported: based on user number/bandwidth

End-to-end QoS, AP upload speed limit, RF management, Country code lock

Static channel and power configuration, Auto channel and power configuration

Auto transmission rate adjustment, Coverage hole detection and correction

Load balancing, Supported: based on traffic, user & frequency (dual-frequency supported), Intelligent load balancing, AP load balancing group, Supported: auto-discovery and flexible setting

Security

Static blacklist, Dynamic blacklist, White list, Rogue AP detection

Supported: SSID based, BSSID, device OUI, Rouge AP countermeasure, Flooding attack detection, Spoof attack detection

Weak IV attack detection, WIPS/WIDS, Supported: 7-layer mobile security, Layer 2 protocol, ARP (gratuitous ARP)

802.1p, 802.1q (Maximum VLANs: 4094), 802.1x

IP protocol

IPv4 protocol, Native IPv6, IPv6 SAVI, IPv6 Portal, Multicast, MLD Snooping, IGMP Snoopin, Multicast group, Multicast to Unicast (IPv4, IPv6), Supported: Set unicast limit based on operating environment

Redundancy

1+1 failover between ACs, Intelligent AP sharing among AC, Remote AP, Management and deployment

Network management

WEB, SNMP v1/v2/v3, RMON, Network deployment, WEB, CLI, Telnet, FTP

Green features

Scheduled shutdown of AP RF interface, Scheduled shutdown of wireless service, Per-packet power adjust­ment (PPC)

WLAN Application

RF Ping, Remote probe analysis, Packet forwarding fairness adjustment, 802.11n packet forwarding suppression

Access based traffic shaping, Co-AP channel sharing, Co-AP channel reuse, RF interface transmission rate adjustment algorithm

Drop wireless packet with weak signal, Disable user access with weak signal, Disable multicast packet caching

Status blink (limited to some AP). New added features, Policy forwarding, VLAN pool, Bonjour gateway, 802.11w, 802.11k, v

Hotspot2.0 (802.11u), NAT, VPN

Firewall

Attack protection against malicious attacks, such as land, smurf, fraggle, ping of death, teardrop, IP spoofing, IP fragmentation, ARP spoofing, reverse ARP lookup, invalid TCP flag, large ICMP packet, address/port scanning, SYN flood, ICMP flood, UDP flood, and DNS query flood, ASPF application layer packet filtering, Basic and advanced ACLs, Time range-based ACL, User-based and application-based

Antivirus

Signature-based virus detection

Manual and automatic upgrade for the signature database, Stream-based processin

Virus detection based on HTTP, FTP, SMTP, and POP3

Virus types include Backdoor, Email-Worm, IM-Worm, P2P-Worm, Trojan, AdWare, and Viru

Virus logs and reports, Signature-based virus detection, Deep intrusion prevention

Prevention against common attacks such as hacker, worm/virus, Trojan, malicious code, spyware/adware, DoS/DDoS, buffer overflow, SQL injection, and IDS/IPS bypass

Attack signature categories (based on attack types and target systems) and severity levels (including high, medium, low, and notification)

Manual and automatic upgrade for the attack signature database (TFTP and HTTP)., P2P/IM traffic identification and control

Email/webpage/application layer filtering, HTTP URL/content filtering

VPN

L2TP VPN, IPSec VPN, GRE VPN, SSL VPN, NAT

Many-to-one NAT, which maps multiple internal addresses to one public address

Many-to-many NAT, which maps multiple internal addresses to multiple public addresses

One-to-one NAT, which maps one internal address to one public address, NAT of both source address and destination address

External hosts access to internal servers, Internal address to public interface address mapping, NAT support for DNS

Setting effective period for NAT, NAT ALGs for NAT ALG, including DNS, FTP, H.323, ILS, MSN, NBT, PPTP, and SIP

Visitors: 75,597