User manual
Page 2
Features and Benefits
Highly Secured Wireless Network
The access point supports the highest available wireless security
standard: WPA2. WPA2 has two different modes: WPA2-Personal for
SOHO users and WPA2-Enterprise for Enterprise users. The access point
also supports IEEE 802.1x for secure and centralized user-based
authentication. Wireless clients are thus required to authenticate
through highly secure methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in
order to obtain access to the network.
STP
Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data
paths into a standby (blocked) state. If one network segment in the
Spanning-Tree Protocol becomes unreachable, or if Spanning-Tree
Protocol costs change, the spanning-tree algorithm reconfigures the
spanning-tree topology and re-establishes the link by activating the
standby path.
HTTPS
The access point supports HTTPS (SSL) in addition to the standard HTTP.
HTTPS (SSL) features additional authentication and encryption for
secure communication.
Telnet
Telnet allows a computer to remotely connect to the access point CLI
(Command Line Interface) for control and monitoring.
SSH
SSH (Secure Shell Host) establishes a secure host connection to the
access point CLI for control and monitoring.
WDS2
WDS2 (Wireless Distributed System 2) links up access points to create a
wider network in which mobile users can roam while still staying
connected to available network resources.