Spec Sheet

10
WPA—Temporal Key Integrity Protocol (TKIP)
WPA-TKIP addresses well-known vulnerabilities in WEP encryption. TKIP provides key rotation on a per-packet basis along with Michael message integrity check (MIC), which determines
if data has been tampered or corrupted while in transit. This robust method of encryption provides a higher level of protection for your data and protects your network from a variety of types
of attacks. Released by the WECA industry consortium, WPA-TKIP is an early version of the forthcoming IEEE 802.11i security standards.
KeyGuard™—MCM
This implementation of TKIP is based on the IEEE 802.11i draft security standards. Like WECAs version of TKIP, KeyGuard provides a different key for every packet of data, but uses a different
version of message integrity check (MIC) to determine if data has been tampered or corrupted during transmission.
WTLS Advanced Encryption Standard (AES) Virtual Private Networking (VPN)
Symbol’s AirBEAM® Safe VPN server provides a complete end-to-end VPN, ensuring the privacy, integrity and authentication of your wireless communications. The AES encryption algorithm
(the standard encryption used by the U.S. government) provides a very high-level of security between clients and the VPN server. Support for session persistence and resume ensures
continuous communications, protecting against interrupted transactions and preventing the need for repeated logins. Extensive client support for DOS, WIN CE, Pocket PC/Window Mobile
2003 and Windows PC platforms provides integration and security for all of your mobile devices.
Ease of Management
Management is intuitive and secure, and can be accessed via our command line interfaces (telnet, serial), embedded web-based java applet, and standard Simple Network Management
Protocol (SNMP).
Policy-Based Management
Policy-based management enables the creation of user, application, and device groups with specific resource and network access configurations, including physical layer attributes, WLAN
topologies, forwarding rules, and security components. A wide variety of parameters can be configured for each group for up to 32 WLANs, either manually or via easy-to-use wizards, such
as radio settings, service definitions, Quality of Service (QoS), virtual LANs, ESS/BSSID domains, Layer 2/3 filtering, DHCP, NAT, and more.
Management Interfaces
Four interfaces provide flexibility for managing the WS5000:
The Command Line Inter
face (CLI) is designed with well-known industry semantics and provides complete baseline management through Telnet or Serial interfaces.
• Web-based management provides secure, anytime-anywhere management with an intuitive, web-based GUI that supports step-by-step software-based wizards that enable easy
configuration of a wide variety features.
The WS5000 is designed to grow and adapt to changing network and
organizational needs—adding additional network capacity is easy and
less expensive than traditional WLAN solutions.
11
SNMP, combined with our extensive Management Information
Base (MIB) support, allows you to manage wireless functionality
with common Network Management Station (NMS) tool sets,
including Symbol’s Enterprise Mobility Manager (SEMM) and
Wavelink’s Mobile Manager.
Trivial File Transfer Protocol (TFTP) is provided to support image
and configuration downloads.
Automatic Access Port Management
The WS5000 automatically provides the latest firmware to Access
Ports upon installation, ensuring all components in the wireless
LAN are always up-to-date. Management is simplified because
there is no longer a need to configure and load firmware on each
access point.
Scalability
The WS5000 Wireless Switch System is designed to grow and adapt
to changing network and organizational needs. Adding additional
network capacity is much easier and less expensive than traditional
WLAN solutions: each WS5000 enables the addition of up to 30 Access
Ports and 32 WLANs. The plug-and-play Access Ports are ready to
install right out of the box—just attach to your layer 2 LAN with Power-
over-Ethernet and the network is immediately operational. LAN network
integration is transparent. The result is a highly scalable wireless
network architecture that eliminates the complexities associated
with the management of a traditional access point-based infrastructure.
System Redundancy
The WS5000 supports redundant warm-standby switch configuration.
Designed for parallel use with an active WS5000, the WS5000-RS
unit provides complete redundancy. Less expensive than the WS5000,
this secondary device exchanges the system configuration and a
simple heartbeat message with the primary WS5000 switch. In the
event of a hardware or software failure, the redundant switch takes
control of the wireless infrastructure ensuring consistency of
operations and continuity of service.
Power-over-Ethernet Accessories
To lower your cost of installation, Symbol’s Wireless Switch System
family includes a complete line of components to meet all your wireless
networking needs, including a complete line of Power-over-Ethernet
(POE) devices. POE devices eliminate the need to run costly power
lines and install outlets to provide power for Access Ports, simplifying
installation and reducing costs.
Anytime,
anywhere
management is
simplified,
intuitive and
secure.