Supported AP ModelsWAC730 802.11ac 3x3 (1.7 Gbps) Wireless Access Point
WAC720 802.11ac 2x2 (1.3 Gbps) Wireless Access Point
WNDAP660 802.11n 3x3 (900 Mbps) Wireless Access Point
WND930 Outdoor Dual Band 802.11n (600 Mbps) Wireless Access Point
WNDAP360 Dual Band 802.11n (600 Mbps) Wireless Access Point
WNDAP350 Dual Band 802.11n (600 Mbps) Wireless Access Point
WN370 802.11n (300 Mbps) Wall Mount Wireless Access Point
WNAP320 802.11n (300 Mbps) Wireless Access Point
WNAP210 802.11n (300 Mbps) Wireless Access Point
Supported ModesWireless-A/B/G/N/AC
Main FunctionalityWireless Controller
Number of Access Points50 per controller (Default support of 2 with optional license to support up to 50 AP’s)
Maximum AP Supported per Controller2 (default)
50 with Incremental 10-AP License Upgrades (WC10APL-10000S)
Redundancy Support of Wireless ControllerStackable up to 3 controllers for a total support of 150 Access Points
Supporting N + 1 redundancy with a maximum configuration of 3 active controller and 1 standby
Maximum Profile Groups per Controller8
Each access point belongs to only one profile group
Maximum Security Profiles (SSID) per Profile Group8 per radio (2.4 GHz; 5 GHz)
Maximum Security Profiles (SSID) per Controller128
Maximum Rogue APs Detectable per Controller512
Maximum Floorplans per Controller3 (default)
Additional floorplans possible with USB local storage (up to a maximum of 18 floorplans)
Number of Captive Portals per Controller1
Maximum Clients per APWNAP210 support up to 32 clients
WNAP320 support up to 64 clients
WN370 support up to 64 clients
All other AP’s support up to 128 clients
Maximum Clients per ControllerNone other than maximum clients per AP
L2 MobilityL2 fast roaming support between the APs
L3 MobilityL3 fast roaming support with encrypted tunnelling between the APs and the controller
Maximum VLANs per Controller64 VLANs for SSIDs
1 configurable management VLAN
DHCP Server/RelayIntegrated DHCP server
Multiple DHCP server/pool can be added for different VLANs (up to 64)
VLANs for the Wireless ControllerOne management VLAN (configurable VLAN ID)
VLANs Access Points / Multiple SSIDs64 VLANs
VLANs DeploymentThe Wireless Controller must have IP connectivity with the access points through the management VLAN. If the Controller and the APs are on different management VLANs, external VLAN routing must allow IP connectivity between the Controller and the APs.
Integrated Deployment PlanningHierarchical view of the network: Floor maps upload and floor maps dimensions input
Automated RF planning algorithm: Computed number of APs required to cover a floor plan
Theoretical cloud coverage indicated for each AP for positioning assistance on the floor plan
RF MonitoringCoverage computing per floor plan
Alert for any detected coverage holes with mitigation options with neighboring APs
Rogue AP/blacklisted clients triangulation
Automatic Channel AllocationChannel automatic distribution to reduce interference
Auto-channel allocation takes into consideration the AP location, interferences, and neighborhood maps for each AP
Modifiable list of corporate channels to be used
Scheduled mode for auto-channel allocation
Automatic mode available in case of high level of interference
Automatic Power ControlOptimum transmit power determination based on coverage requirements
Automatic power control mode available
Neighborhood scan of RF environment to minimize neighboring AP interference and leakage across floors
Coverage Hole DetectionAutomatic mode
Down APs or compromised RF environment detection with alerts
Self healing: Automatic neighboring AP power increase to fill in for coverage losses
Load BalancingAP load monitoring and overload prevention
Client redirection to lightly loaded neighboring APs
Fast RoamingSeamless rapid mobility across VLAN and subnets
Includes 802.11i pre-auth and fast roaming
Fast roaming support across L2, and L3 for video, audio and voice over wireless client
WMM Quality of ServiceWMM (802.11e) prioritizes traffic for both upstream traffic from the stations to the access points (station EDCA parameters) and downstream traffic from the access points to the client stations (AP EDCA parameters)
WMM Queues in Decreasing Order of PriorityVoice: The highest priority queue with minimum delay, which makes it ideal for applications like VoIP and streaming media
Video: The second highest priority queue with low delay is given to this queue. Video applications are routed to this queue
Best effort: The medium priority queue with medium delay is given to this queue. Most standard IP application will use this queue
Background: Low priority queue with high throughput. Applications, such as FTP, which are not time-sensitive but require high throughput can use this queue
WMM Power Save OptionWMM power save helps conserve battery power in small devices such as phones, laptops, PDAs, and audio players using IEEE
®
802.11e mechanisms
Rate LimitingRate limit per SSID set as a percentage of total available bandwidth
Client Authentication ProtocolsOpen, WEP, WPA/WPA2-PSK
802.11i/WPA/WPA2 Enterprise with standard interface to external AAA/RADIUS Server
Local ACLs (512 MAC)
MAC ACLs based on local AAA Server or external Radius Server
Distinct AAA Server per SSIDYes
RADIUS Accounting ProtocolPer Client tracking for Bytes Tx/Rx and
Connect/disconnect time
LDAP-based AuthenticationStandard interface to external LDAP server/Microsoft
®
Active Directory Server
Integrated AAA ServerLocal database authentication based on WC7520 internal AAA Server
Guest AccessIntegrated captive portal available for client authentication in a security profile
Password based authentication mode: Local user store available, receptionist assigned user name/password
External Radius server mode: External RADIUS authentication for the captive portal clients
Open authentication mode: Guest auto registration with email address
Extraction of logs of guest activity
Captive PortalConfigurable portal page, including image files
Rogue Access PointsRogue AP definition: AP with radio SSID observed by any of the managed APs and seen transmitting on same L2 wired network
Detection and mapping of up to 512 rogue APs
Monitoring SummarySummary of managed access points status, rogue access points detected, wireless stations connected, Wireless Controller information and wireless network usage
Managed Access PointsAP status for the managed access points and details that includes configuration settings, current wireless settings, current clients and detailed traffic statistics
Rogue Access PointsRogue access points reported
Rogue access points in same channel
Rogue access points in interfering channels
Wireless ClientsClients statistics and details per AP, per SSID, per floor, per location
Blacklisted clients, roaming clients
Wireless Network UsageNetwork usage statistics display plots of average received/transmitted network traffic per managed access point.
Heat MapsLive coverage and visualization heat maps
Location visualization and device tracking
Logging and ReportingIf available syslog server on the network, the Wireless Controller can send all logs. Logs are also available on the GUI and ready to download (log export file)
Email alerts for events as per configuration to multiple email addresses
DiagnosticsManaged access points ping
MaintenanceSave/restore configuration, restore to factory defaults, admin password change, add user (read-only), firmware upgrade via Web browser for the Wireless Controller and the managed access points
RFC - System FacilitiesRFC 1001 Protocol standard for a NetBIOS service on a TCP/UDP transport: Concepts and methods'
RFC 1002 Protocol standard for a NetBIOS service on a TCP/UDP transport: Detailed specifications
RFC 1155 Management information for TCP/IP networks
RFC 1305 Network Time Protocol (Version 3) Specification, Implementation and Analysis
RFC 2131 DHCP
RFC 3768 Virtual Router Redundancy Protocol (VRRP)
RFC 768 UDP
RFC 791 IP
RFC 792 ICMP
RFC 793 TCP
RFC 826 ARP
RFC - Security and AAAWPA-PSK, WPA2-PSK
RFC 1321 MD5 Message – Digest Algorithm
RFC 1851 Triple DES Algorithm
RFC 2246 TLS Protocol Version 1.0
RFC 2404 HMAC-SHA-1-96
RFC 3280 Internet X.509 PKI Certificate and CRL certificate
RFC 3377 Lightweight Directory Access Protocol (v3): Technical Specification
RFC 3565 Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax
RFC 4346 TLS Protocol version 1.1