武汉泽雅信息科技有限公司 武汉泽雅信息科技有限公司

H3C无线网络产品

H3C WX2580X-LI Next-Generation Enterprise-Grade Core Multi-Service Wireless Controller (AC)

H3C WX2580X-LI Next-Generation Enterprise-Grade Core Multi-Service Wireless Controller (AC)

Details

The H3C WX2580X-LI is a gateway-type wireless controller (AC) based on the Comware platform from H3C Technologies Co., Ltd. The WX2580X-LI offers a wide range of services, integrating sophisticated user control and management, comprehensive RF resource management, 24/7 wireless security control, fast Layer 2 and 3 roaming, flexible QoS control, and IPv4 & IPv6 dual-stack functionality, providing powerful wired and wireless integrated access capabilities.

The H3C WX2580X-LI wireless controller is specifically designed for branch offices and small campus wireless network deployments. Integrating gateway and AC functions, it reduces the types and number of devices businesses need to purchase for network setup, thus reducing investment. When used with the H3C Fit AP product series, it supports WIPS, firewall, and other functions. It also features a variety of port types, notably a built-in USB interface for connecting relevant enterprise peripherals.

The H3C WX2580X-LI wireless controller, when used in conjunction with the H3C Fit AP product series, can meet typical wireless application needs such as WLAN access in small business campuses and hotspot coverage in branch offices.

751b2880-d5a3-4590-a763-cbdca6822b51

1. Provides management of 802.11ax APs.

The WX2580X-LI wireless controller supports the management of traditional 802.11a/b/g/n/ac APs, and can also be used in conjunction with H3C APs based on the 802.11ax protocol to form a network. This breaks through the traditional serial communication mechanism of wireless networks, resulting in a significant increase in the utilization of wireless spectrum resources, a substantial increase in the number of effective access users, a reduction in the deployment cost of wireless networks, and a greatly improved user experience in high-density user environments.

2. Provides flexible data forwarding methods

Traditional wireless controller deployments typically employ a centralized forwarding model. While the AC (Access Controller) provides comprehensive control and security over packets, all wireless traffic requires unified processing at the AC, making core link bandwidth and AC forwarding capabilities bottlenecks. This is particularly problematic when APs and ACs are connected via a wide area network (WAN). With APs deployed as data access devices in branch offices and ACs at headquarters, all user data is sent from the APs to the ACs for centralized forwarding, resulting in low forwarding efficiency. The WX2500X series wireless controllers support centralized forwarding, distributed forwarding, and policy-based forwarding, allowing users to flexibly configure forwarding methods based on business needs and network conditions.

The WX2580X-LI wireless controller also supports a centralized authentication and local forwarding networking mode, providing centralized authentication and management of 802.1X and Portal when the data stream is forwarded locally.

3. Wireless 4i Technology System

In the construction and operation of enterprise wireless networks, "network optimization" is an indispensable part. Effective network optimization not only ensures the user experience and performance but also increases the number of users connected to devices, extends device lifespan, and thus protects existing investments to a certain extent, maximizing the value of the wireless network. Against this technological trend, H3C focuses on enhancing its "experience optimization" capabilities, independently developing iRadio, IStation, iEdge, and iHeal technologies to deeply optimize wireless networks in various aspects such as air interface performance, roaming access, application protection, and network automation, resulting in a significant improvement in user experience.

iRadio: Intelligent Radio Frequency Management

Due to the openness of Wi-Fi frequency bands and the priority of spectrum resources, wireless signals are highly susceptible to various interferences. In the same wireless environment, different terminals, locations, and times can all result in different user experiences. iRadio technology uses the following techniques to intelligently schedule radio frequency resources, thereby reducing wireless signal interference, improving air interface performance, reducing packet loss and latency, and improving user experience while enhancing overall network performance.

1) Automatic optimization of radio frequency resources

This technology automatically and intelligently adjusts channel, power, and bandwidth modes according to changes in the wireless environment, ensuring that wireless signal coverage is always at the optimal level, effectively reducing interference, and eliminating the need for manual configuration by maintenance personnel throughout the process, thus achieving fully automated and intelligent optimization of radio frequency resources.

2) Time fairness technology

Wi-Fi wireless transmission operates on a shared channel and shared bandwidth model. Therefore, in multi-user scenarios, while traditional rate fairness methods can prevent high-bandwidth terminals from monopolizing wireless resources, they are ineffective in addressing the issue of other, less capable terminals occupying air interface resources for extended periods. iRadio's time fairness technology allocates the same-length time window for each terminal to send packets, preventing individual terminals from arbitrarily preempting wireless resources, ensuring a good experience for all terminals, and improving the utilization rate of wireless spectrum resources.

3) Broadcast multicast optimization

The difference in transmission rates between unicast, broadcast, and multicast messages has widened with the advancement of Wi-Fi standards. The lower transmission rates of broadcast and multicast messages have severely impacted wireless transmission efficiency. iRadio's broadcast/multicast optimization technology accurately identifies broadcast and multicast messages and implements different strategies in different usage scenarios to minimize their impact and significantly improve wireless air interface performance. Simultaneously, it can also increase the transmission rate of broadcast and multicast messages in appropriate scenarios.

4) Low latency guarantee

The post-pandemic era has spurred enterprises to improve management and operational efficiency through cloud collaboration, with cloud-based office work, remote conferencing, and live video streaming becoming the norm. Unlike previous wireless office needs that merely met basic requirements like coverage and low bandwidth, these low-latency service scenarios place higher demands on wireless networks. Low-latency assurance technologies can effectively identify these types of services and, through a comprehensive control approach including prioritizing, calculating optimal message transmission rates, and using more reasonable frame lengths, ensure faster transmission speeds, effectively reduce air interface latency, and guarantee the normal operation of real-time services.


iStation: Smart Terminal Management

During Wi-Fi usage, the interaction between the device and the terminal is bidirectional. iRadio optimizes radio frequency resources and air interface performance through intelligent intervention on the wireless network device side (AC or AP) to improve the user experience. iStation improves access, roaming, traffic control and other aspects through intelligent management of the terminal.

1) Optimal Access

Terminal access to the wireless network is divided into three stages: "scanning-probe detection-association". Zhiyou Access adopts a unique optimization strategy in each stage to form a complete and effective solution, ensuring that each wireless terminal is associated with its surrounding reasonable radio frequency in one go.

2) Fast Roaming

The WLAN protocol does not provide a roaming mechanism for terminals; instead, the terminals themselves decide when to roam. In practice, the roaming mechanisms of different terminals vary significantly. Slow or frequent roaming can lead to a poor user experience while on the move. iStation's fast roaming technology classifies and tags terminals, and then customizes the roaming guidance mechanism based on different tags, making terminal roaming faster, smoother, and providing a better experience.

3) Guaranteed

Compared to traditional business prioritization strategies, VIP protection technology divides users into multiple tiers.


iEdge: Intelligent Edge Computing

iEdge technology empowers W-Fi 6 APs with edge service awareness capabilities, and achieves an ultimate experience of seamless network and terminal awareness through service identification, optimal forwarding, and routing.

1) Edge security protection

Unlike traditional vendors that implement security policies at the network's central access control (AC) or firewall, H3C applies a comprehensive security protection solution at layers 2-7 to its Wi-Fi 6 access points (APs). Performing security analysis and policies at the network edge AP not only provides rapid response but also brings security protection forward to the air interface level, directly isolating threats outside the wireless network.

2) Edge application acceleration

Edge acceleration technology can intelligently identify user applications and save snapshots of these applications. Subsequent user packets are compared with these snapshots, and combined with intelligent sorting technology, identified application packets can be processed at high speed, overcoming the problems of low DPI performance and inaccurate application identification by traditional DFI. Based on this technology, APs can also perform targeted optimizations during roaming to ensure a smooth user experience when using critical services. Furthermore, when the AP detects excessive air interface occupancy, it can strategically suppress non-critical service traffic, achieving a bidirectional application acceleration effect.

3) Historical Retrospection of the Margins

Access, authentication, DHCP interaction, ARP interaction, and DNS resolution are fundamental for terminal online processes, and these steps are also highly prone to problems and extremely difficult to reproduce. Based on H3C Wi-Fi AP's key protocol snapshot technology, the entire process of terminal access, authentication, DHCP interaction, ARP interaction, and DNS resolution is fully restored, accurately recording each key moment, providing support for judging terminal user experience and the overall network device status.

iHeal: Intelligent Network Healing

H3C iHeal technology assists users in achieving more efficient, seamless, fully automatic, and intelligent wireless network optimization by combining three major functions: automatic problem discovery, automatic problem resolution, and gradual network optimization, thereby comprehensively improving the wireless user experience.

1) Automatic problem detection

iHeal technology introduces Telemetry technology to enrich operation and maintenance data, enabling the identification of hundreds of problems and root cause analysis of terminal online failures, as well as automatic closure of multiple types of problems. This allows users to proactively discover problems before they are reported, achieving intelligent and proactive operation and maintenance.

2) Problems are solved automatically.

After automatically identifying a problem, iHeal technology further analyzes and locates the root cause to confirm the reason for the problem. Once the root cause is identified, iHeal automatically selects and deploys a suitable handling strategy from its expert strategy library, monitors the problem's progress in real time, and dynamically adjusts strategy parameters to ultimately achieve a closed-loop problem resolution. This truly realizes a fully automated closed-loop operation and maintenance system without human intervention, resulting in truly intelligent operation and maintenance that significantly improves efficiency and productivity.

3) Gradual optimization of the entire network

Wireless networks are dynamic and ever-changing networks. iHeal's progressive optimization technology enables the network to adapt to changes in a timely manner, continuously optimize itself, and always maintain a high-performance, low-interference state, thereby fundamentally reducing the number of problems and evolving towards a truly high-experience, zero-maintenance system.

4. Supports carrier-grade wireless user access control and management

User-based access control is a key feature of the WX2580X-LI wireless controller. The User Profile provides a configuration template that can save preset configurations (a collection of configurations). Users can configure different content for their User Profile according to different application scenarios, such as CAR (Committed Access Rate) policies and QoS (Quality of Service) policies.

When a user accesses a device, authentication is required. During authentication, the authentication server sends a User Profile name to the device, and the device immediately activates the specific settings configured in the User Profile. When a user successfully accesses the device, the device uses these settings to restrict the user's access behavior. When a user logs off, the system automatically disables the configuration items under the User Profile, thus removing the restrictions imposed by the User Profile on the user. Therefore, User Profiles are suitable for restricting the access behavior of online users. When no user is online (e.g., no user accesses the device, the user fails authentication, or the user logs off), the User Profile remains in its default configuration and is ineffective.

In addition, the WX2580X-LI wireless controller also supports MAC-based authentication access control. This method not only allows customers to configure and modify user group permissions on the AAA server, but also supports the configuration of permissions for specific users. This fine-grained user permission control greatly enhances the availability of the wireless network, and network administrators can easily assign access permissions to different levels of people or groups of people through this method.

MAC-based VLANs are also a major feature of the WX2580X-LI wireless controller. In terms of control policies, administrators can group users with the same MAC address into the same VLAN and configure security policies on the controller based on VLANs. This simplifies system configuration and enables fine-grained management at the user level.

For security or billing reasons, system administrators may want to control where wireless users access the network. The WX2580X-LI wireless controller supports AP location-based user access control. When a wireless user accesses the network, the authentication server can send a list of APs that allow user access to the AC, and access control can be performed on the AC to restrict wireless users to accessing only APs in specified locations.

4. Provide reliable gateway functionality

The WX2580X-LI is positioned as a gateway for small and medium-sized enterprises and branch offices, integrating both gateway and AC functions. Its dual WAN port design provides a foundation for uplink backup. Furthermore, compared to the previous generation, the WAN ports utilize a 2.5G multi-rate interface, significantly improving uplink efficiency. The WX2580X-LI supports common gateway functions such as PPPoE, NAT gateway functionality, dynamic IP address, and static IP address settings.

5. Supports Bonjour Gateway

The WX2580X-LI wireless controller supports Bonjour Gateway functionality, making it easy for small businesses to use Apple devices such as printers, TVs, and tablets.

6. Supports 7-layer mobile security detection/defense (WIDS/WIPS)

The WX2580X-LI wireless controller supports mobile security defense modes including: blacklist, whitelist, rogue defense, malformed packet detection, unauthorized user disconnection, and attack detection and countermeasures based on the pre-set and upgradeable Signature MAC layer (e.g., DoS attacks, Flood attacks, man-in-the-middle attacks). Combined with the massive intelligent expert knowledge base built into the wireless application console, it provides flexible basis for wireless security policy judgments, enabling visual physical location tracking and monitoring, and removal of physical ports on switches for clearly identified unauthorized attack sources (APs or terminals, etc.).

By working in conjunction with H3C's professional core layer firewall/IPS equipment, it can achieve a 7-layer three-dimensional security defense for mobile campuses, meeting the true end-to-end security protection needs from wireless (802.11) to wired (802.3).

7. Supports RealTime Spectrum Guard mode

RealTime Spectrum Guard (RTSG) is a professional monitoring solution for the spectrum status of wireless environments, innovatively proposed by H3C. The entire series of wireless controllers can be deeply integrated with Sensor APs that have built-in RF acquisition modules to achieve RF monitoring and real-time spectrum protection.

The RTSG console is integrated into the H3C iMC Intelligent Management Center. Through the CAPWAP management tunnel, it communicates with Sensor APs and collects data, enabling 24/7 wireless environment quality monitoring, wireless network capability trend assessment, and unlicensed interference alarms. Graphically, it proactively detects and identifies all RF interference sources (Wi-Fi or non-Wi-Fi) in the 2.4GHz/5GHz bands, providing real-time FFT plots, spectrum density plots, spectrum plots, duty cycle plots, event spectrum plots, channel power, interference power, etc. It can automatically identify interference sources, pinpoint the location of problematic wireless devices, and ensure optimal wireless network performance. Combined with the H3C iAR intelligent reporting component, it enables the storage, tracing, and playback of historical RF quality data across the entire coverage area, automatically generating customized trend, compliance, and audit reports.

To meet the different levels of user wireless environment monitoring needs, the RTSG solution can be flexibly deployed in either Local mode or Monitor mode. When operating in Local mode, it can maintain normal user access and packet forwarding while achieving effective spectrum protection.

8. Built-in RF Optimization Engine (ROE)

The WX2580X-LI wireless controller features a built-in RF Optimizing Engine for access points (APs). Through feature- and protocol-based RF optimization, it effectively enhances application acceleration and quality assurance in high-density access and streaming media transmission scenarios in wireless deployments. This includes features such as multi-user fair scheduling, fair hybrid access, interference filtering, rate optimization, spectrum navigation, multicast enhancement (IPv4/IPv6), per-packet power control, and intelligent bandwidth guarantee.

9. Supports 802.1x authentication, MAC address authentication, Portal authentication, etc.

The WX2580X-LI wireless controller supports multiple authentication methods:

802.1x Authentication: The WX2580X-LI wireless controller supports multiple 802.1x authentication methods, including TLS, PEAP, TTLS, MD5, and SIM card authentication. It also supports local 802.1x authentication, providing support for mainstream authentication methods such as MD5, TLS, and PEAP, eliminating the need for users to configure an additional AAA server. The WX2580X-LI wireless controller also supports dynamic VLAN and ACL authorization after 802.1x authentication. User policies can be pre-configured, and the system automatically configures client permissions during authentication.

MAC Address Authentication: The WX2580X-LI wireless controller supports MAC address authentication. For some handheld terminals (such as Wi-Fi phones and handheld mobile terminals), which are not convenient to use computer-based authentication methods, MAC address authentication can easily solve this problem. By configuring valid MAC addresses on the controller or AAA server, terminals corresponding to these MAC addresses can be allowed to access the network, while unauthorized terminals that have not been configured beforehand cannot access the wireless network. This function greatly facilitates applications such as wireless medical systems. MAC address authentication can ensure that only hospital PDA work terminals can access the wireless network, while denying patients' wireless PDAs the use of the dedicated wireless network.

Portal Authentication: The WX2580X-LI wireless controller provides a built-in Portal authentication server. This authentication method requires no client cooperation, directly using the browser's web portal page as the authentication channel. Once the user is successfully authenticated, they can be flexibly redirected to a designated access homepage and the corresponding authorization and billing processes can be initiated. Customized portal pages can also be flexibly pushed according to policy requirements to achieve advertising and information dissemination purposes, making it widely used in wireless campuses, wireless cities, and visitor access applications.

10. Supports IPv4/IPv6 dual protocol stack (Native IPv6)

The WX2580X-LI wireless controller supports IPv6 access for wireless clients. At the tunnel origin AP, because the device is IPv6 aware, it can perform IPv6 priority mapping to tunnel priority, etc. At the AC side, it can also perform complex control and filtering such as ACL filtering on IPv6 packets.

The WX2580X-LI wireless controller can also be deployed in IPv6 networks, automatically negotiating an IPv6 tunnel between the AC and AP. Even when the AC and AP are fully operational in IPv6 mode, the wireless controller can still correctly perceive IPv4 and process IPv4 packets from wireless clients. The WX2580X-LI wireless controller's flexible IPv4/6 adaptability can meet the complex application needs of customers migrating from IPv4 to IPv6 networks. It can provide IPv4 services to customers in IPv6 silos while also allowing users in IPv4 silos to easily log in to the network via IPv6 protocols.

To address the rampant IPv6 packet spoofing attacks on campus networks, the WX2580X-LI wireless controller supports IPv6 SAVI (Source Address Validation) technology. By monitoring the address allocation protocol to obtain users' IP addresses, it ensures that the correct address is used for subsequent internet access and prevents the spoofing of other users' IP addresses, thus guaranteeing the reliability of the source address. Furthermore, the combination of IPv6 SAVI and Portal technology further ensures the authenticity and security of all internet user packets.

11. Provide end-to-end QoS

The WX2580X-LI wireless controller is developed based on the Comware platform, which not only fully supports the Diff-Serv standard, but also adds QoS support for the IPv6 protocol.

The QoS Diff-Serv model mainly includes flow classification, traffic policing, queue management, and queue scheduling. It fully implements the six PHB groups and services defined in the standard, namely EF, AF1 to AF4, and BE, enabling network operators to provide users with service guarantees with different service quality levels, and making the Internet a truly integrated network that simultaneously carries data, voice, and video services.

12. Supports fast 2nd and 3rd layer roaming.

H3C's centralized wireless architecture not only facilitates Layer 2 roaming but also greatly benefits Layer 3 roaming. WLAN networks deployed with Fat APs face significant challenges in implementing Layer 3 roaming due to limited information exchange between APs. The centralized architecture easily solves this problem. The WX2500X wireless controller supports both Layer 2 and Layer 3 roaming, with roaming domains unrestricted by subnets. This excellent roaming feature allows customers to focus on wireless signal coverage rather than extensively planning their existing networks, significantly simplifying initial network planning and reducing costs.

In traditional mode, when wireless user terminals use 802.1x as the means of 802.11 access authentication and key exchange, the number of communication messages between the wireless user terminal and the access point (AP) is very high. When a wireless user terminal roams between two APs, if the wireless user terminal completely follows the full 802.1x interaction process during the access process to a new AP, it will inevitably result in excessively long roaming handover times. For some services that are sensitive to roaming handover time (such as voice services), such long handover times are unacceptable. The WX2500X wireless controller uses key caching technology to enable fast handover for users during roaming. Key caching technology strikes a good balance between secure user access and fast roaming, allowing wireless user terminals to avoid repeating the full 802.1x authentication interaction process when roaming between two APs, while ensuring the continuity of user identification and key usage. Wireless users use fast roaming, with a roaming time of no more than 50ms within a single AC, meeting the stringent requirements of voice services.


Hardware Specifications

project

WX2580X-LI

External dimensions (width × depth × height)

440 mm *250 mm *43.6 mm

Fully equipped weight

3.3kg

Throughput

10Gbps

interface

WAN 2*2.5GE & LAN 8*GE & LAN 2*SFP+ & 1*USB + 1*Console

power supply

Built-in dual power supply

Operating/Storage Ambient Temperature

0°C~45°C/-40°C~70°C

Relative humidity of the working/storage environment (non-condensing)

5%~95%

Safety regulations

FDA 21 CFR Subchapter J

GB 4943.1

UL 62368-1

CAN/CSA C22.2 No 62368-1

IEC 62368-1

EN 62368-1

AS/NZS 62368-1

EMC

CISPR 35:2016

EN 61000-3-2:2014

EN 61000-3-3:2013

ETSI EN 300 386 V1.6.1(2012-09)

ETSI EN 300 386 V2.1.1(2016-07)

EN 55032:2015+A1:2020

EN 55032:2015+A11:2020

EN 55035:2017+A11:2020

CISPR 32:2015+AMD1:2019

AS/NZS CISPR 32:2015+AMD1:2020

EN IEC 61000-3-2:2019

EN IEC 61000-3-2:2019+A1:2021

EN 61000-3-3:2013+A1:2019

EN 61000-3-3:2013+A1:2019+A2:2021

EN 61000-3-3:2013+A2:2021+AC:2022

ETSI EN 300 386 V2.2.1(2022-09)

GB/T 9254.1-2021

MTBF

≥145 years


Software Specifications

project

Supported features

WX2580X-LI

Basic performance

Default number of managed APs

0

License Step

1/4/8/16/32/64/128

Maximum number of managed APs

512

Maximum number of APs

1024

Maximum number of users

8192

ARP entries

16384

ND entries

16384

IPv4 routing table

16384

IPv6 routing table

16384

VLAN table

4096

MAC table

16384

Maximum number of Portal Authentication Users

8192

Maximum number of users for 802.1x authentication

8192

802.11MAC

802.11 protocol suite

support

Maximum number of SSIDs for the whole machine

512

Hidden SSID

support

User limit

Supports: User limit based on SSID and Radio

User online testing

support

Users with no data usage will automatically age out.

support

Multi-country code deployment

support

Wireless User Isolation

support:

1. Wireless VLAN Layer 2 Isolation for Wireless Users

2. SSID-based Layer 2 isolation for wireless users

Automatic switching between 20MHz and 40MHz in 40MHz mode

support

Local forwarding

support

CAPWAP

Automatically enter AP serial number

support

AC discovery (DHCP option 43, DNS method)

support

IPv6 tunnel

support

Clock synchronization

support

AP Dual Uplink Tunnel Link

support

Configure AP basic network parameters via AC

Supports: configuring static IP addresses, VLANs, and access AC addresses, etc.

Supports L2 and L3 layer networking between AC and AP.

support

Crossing NAT between AP and AC

support

Roaming ability

Layer 2 and Layer 3 roaming under different APs within the same AC

support

Roaming on Level 2 and Level 3 between different ACs and different APs

support

Routing features

NAT

support

PPPoE

support

DDNS

support

SSL VPN

support

IPSEC VPN

support

RIP/RIPNG

support

GRE

support

Access control

Open system、Shared-Key

support

WEP-64/128, Dynamic WEP

support

WPA、WPA2、WPA3

support

TKIP

support

CCMP

support

WHERE

support

SSH v2.0

support

Wireless EAD (Endpoint Admission Control)

support

Local authentication

Supports: 802.1X, Portal, MAC authentication

LDAP authentication

support

Visitor access

support

QoS

Priority mapping

support

L2-L4 flow classification

support

Traffic throttling

support

802.11e/WMM

support

User Profile-based access control

support

Intelligent bandwidth limiting

support

Intelligent bandwidth guarantee

support

Voice optimization (WMM, SVP mapping)

support

WMM CAC

support

End-to-end QoS

support

Wireless resource management

Country code lock

support

Static channel and power settings

support

Dynamic channel and power settings

support

Dynamic rate adjustment

support

Air-hole detection and compensation

support

Load balancing dimensions

Supports: Based on traffic, user, and frequency band (dual-band support)

Intelligent load balancing

support

Security Defense

Static blacklist

support

Dynamic blacklist

support

Whitelist

support

Illegal AP detection

Supports: Based on SSID, BSSID, device OUI, etc.

Countermeasures against illegal APs

support

Defend against wireless flooding attacks

support

Preventing Spoof Attacks

support

Weak IV attack protection

support

WIPS

Supports: Enables 7 layers of mobile security defense.

Layer 2 protocol

ARP proxy answer

support

802.1p

support

802.1q

support

802.1x

support

Broadcast storm suppression

support

IP protocol

IPv4 protocol

support

Native IPv6

support

IPv6 SAVI

support

IPv6 Portal

support

Multicast Protocol

MLD Snooping

support

IGMP Snooping

support

Multicast to unicast (IPv4, IPv6)

Supports: Unicast access thresholds can be set according to the environment.

Network Management and Configuration

Management methods

Supports: WEB, SNMP v1/v2/v3, RMON, etc.

Configuration method

Supports: WEB, CLI, TELNET, FTP, etc.

Green and energy-saving

Shut down the AP RF port as needed on a scheduled basis.

support

Turn off wireless service as needed on a scheduled basis.

support

Packet-by-packet power control (PPC)

support

WLAN integrated applications

RF Ping

support

Remote probe analysis

support

Real-time Spectrum Protection (RTSG)

support

Intelligent Wireless Service Awareness (wIAA)

Support/Stateful Firewall

Message transmission fair scheduling mechanism

support

802.11n message transmission suppression

support

Connectivity-based traffic shaping

support

Adjusting channel sharing between APs

support

Adjusting inter-AP channel reuse

support

RF interface transmit rate adjustment algorithm

support

Ignore weak signal wireless packets

support

Disable weak signal clients from accessing the network.

support

Disable multicast message caching

support

Blink State Detection (Partial APs)

support


Online
Customer service hotline
027-81566008 027-81566008
Service Hours:
8:00 - 24:00
Customer Service Team:
Online