Specifications
Product Overview
2
Pseudo VLAN which enables the creation of wireless isolated nodes or
workgroups of wireless clients to enhance security in a public access wireless
network.
F
F
E
E
A
A
T
T
U
U
R
R
E
E
S
S
A
A
N
N
D
D
B
B
E
E
N
N
E
E
F
F
I
I
T
T
S
S
The access point has been designed for high performance and offers a rich
suite of features, with which you should acquaint yourself to be able to exploit
your access point’s full potential.
•
•
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
D
D
i
i
s
s
t
t
r
r
i
i
b
b
u
u
t
t
i
i
o
o
n
n
S
S
y
y
s
s
t
t
e
e
m
m
(
(
W
W
D
D
S
S
)
)
This feature allows linking of several access points, virtually creating a larger
network infrastructure that allows mobile users to roam wirelessly, while still
being able to access network resources.
•
•
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
P
P
s
s
e
e
u
u
d
d
o
o
V
V
L
L
A
A
N
N
The Compex unique Wireless Pseudo VLAN technology is a feature that
allows wireless clients to be segmented individually or into workgroups, thus
blocking access to another user’s/group’s PCs, and enhancing the privacy
of the wireless clients. This is especially useful in public hotspot deployment.
•
•
H
H
i
i
g
g
h
h
l
l
y
y
S
S
e
e
c
c
u
u
r
r
e
e
d
d
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
N
N
e
e
t
t
w
w
o
o
r
r
k
k
The access point supports the highest available wireless security standard:
Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-PSK for
SOHO users and WPA2-EAP for Enterprise users. The access point also
supports IEEE 802.1x for secure and centralized user-based authentication.
Wireless clients are thus required to authenticate through highly secure
methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to
the network.
•
•
S
S
m
m
a
a
r
r
t
t
S
S
e
e
l
l
e
e
c
c
t
t
This feature will automatically scan and recommend the best channel that
the access point can utilize.
•
•
u
u
C
C
o
o
n
n
f
f
i
i
g
g
U
U
t
t
i
i
l
l
i
i
t
t
y
y
Compex’s exclusive uConfig utility allows users to access the user-friendly
Web configuration interface of the access point without having to change
the TCP/IP setup of the workstation.
•
•
S
S
T
T
P
P
Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data paths into