Reliable, Secure and Scalable Wireless Controller for Mid-sized Businesses, Schools and Hospitals
Performance
Business Value
Images
Specifications
Specifications
Product Specifications
Supported AP ModelsWNDAP360 Dual Band 802.11n Wireless Access Point
WNDAP350 Dual Band 802.11n Wireless Access Point
WNAP320 802.11n Wireless Access Point
WNAP210 802.11n Wireless Access Point
Supported ModesWireless-A/B/G/N
Main FunctionalityWireless Controller
Number of Access Points50 per controller
Maximum AP Supported per Controller20 (default)
50 with 3 x Incremental 10-AP License Upgrades (WC7510L)
Maximum Controllers that Can Be Stacked Together3
Maximum AP Supported per Stacked Setup150
Maximum Profile Groups per Controller8
Each access point belongs to only one profile group
Maximum Security Profiles (SSID) per Profile Group8 per radio (2.4 GHz; 5 GHz)
16 with WNDAP350
Maximum Security Profiles (SSID) per Controller128 (assuming WNDAP350/WNDAP360 and 8 security profiles per radio)
Maximum Security Profiles per Network (3 Controllers)512
Maximum Rogue APs Detectable per Controller512
Maximum Floorplans per Controller3 (default)
Additional floorplans possible with USB local storage (up to a maximum of 18 floorplans)
Number of Captive Portals per Controller1
Maximum Clients per APWNAP210: up to 32 clients; WNAP320: up to 64 clients
WNDAP350 and WNDAP360: up to 64 clients per radio (128 clients total)
Maximum Clients per ControllerNone other than maximum clients per AP
L2 MobilityL2 fast roaming support between the APs
L3 MobilityL3 fast roaming support with encrypted tunnelling between the APs and the controller
Maximum VLANs per Controller64 VLANs for SSIDs
1 configurable management VLAN
Controller RedundancyVRRP-based N+1 redundancy with failover
1:1 when one cold redundant Controller and one production Controller are configured to form a Redundancy group
1:2 or 1:3 when one cold redundant Controller is added to a Stack of 2 or 3 production Controllers
Licenses on the redundant controller need - at least - to match those on each protected production controller
LICENSE CONFIGURATIONSPer Controller: Up to 50 Access Points (AP) with Appropriate Licenses
Per Stack: Up to 150 Access Points (AP) with Appropriate Licenses
DHCP Server/RelayIntegrated DHCP server
Multiple DHCP server/pool can be added for different VLANs (up to 64)
VLANs for the Wireless ControllerOne management VLAN (configurable VLAN ID)
VLANs Access Points / Multiple SSIDs64 VLANs
VLANs DeploymentThe Wireless Controller must have IP connectivity with the access points through the management VLAN. If the Controller and the APs are on different management VLANs, external VLAN routing must allow IP connectivity between the Controller and the APs.
Integrated Deployment PlanningHierarchical view of the network: Floor maps upload and floor maps dimensions input
Automated RF planning algorithm: Computed number of APs required to cover a floor plan
Theorical cloud coverage indicated for each AP for positionning assistance on the floor plan
RF MonitoringCoverage computing per floor plan
Alert for any detected coverage holes with mitigation options with neighboring APs
Rogue AP/blacklisted clients triangulation
Automatic Channel AllocationChannel automatic distribution to reduce interference
Auto-channel allocation takes into consideration the AP location, interferences, and neighborhood maps for each AP
Modifiable list of corporate channels to be used
Scheduled mode for auto-channel allocation
Automatic mode available in case of high level of interference
Automatic Power ControlOptimum transmit power determination based on coverage requirements
Automatic power control mode available
Neighborhood scan of RF environment to minimize neighboring AP interference and leakage across floors
Coverage Hole DetectionAutomatic mode
Down APs or compromised RF environment detection with alerts
Self healing: Automatic neighboring AP power increase to fill in for coverage losses
Load BalancingAP load monitoring and overload prevention
Client redirection to lightly loaded neighboring APs
Fast RoamingSeamless rapid mobility across VLAN and subnets
Includes 802.11i pre-auth and fast roaming
Fast roaming support accross L2, and L3 for video, audio and voice over wireless client
WMM Quality of ServiceWMM (802.11e) prioritizes traffic for both upstream traffic from the stations to the access points (station EDCA parameters) and downstream traffic from the access points to the client stations (AP EDCA parameters)
WMM Queues in Decreasing Order of PriorityVoice: The highest priority queue with minimum delay, which makes it ideal for applications like VoIP and streaming media
Video: The second highest priority queue with low delay is given to this queue. Video applications are routed to this queue
Best effort: The medium priority queue with medium delay is given to this queue. Most standard IP application will use this queue
Background: Low priority queue with high throughput. Applications, such as FTP, which are not time-sensitive but require high throughput can use this queue
WMM Power Save OptionWMM power save helps conserve battery power in small devices such as phones, laptops, PDAs, and audio players using IEEE
®
802.11e mechanisms
Rate LimitingRate limit per SSID set as a percentage of total available bandwidth
Client Authentication ProtocolsOpen, WEP, WPA/WPA2-PSK
802.11i/WPA/WPA2 Enterprise with standard interface to external AAA/RADIUS Server
Local ACLs (512 MAC)
MAC ACLs based on local AAA Server or external Radius Server
Distinct AAA Server per SSIDYes
RADIUS Accounting ProtocolPer Client tracking for Bytes Tx/Rx and
Connect/disconnect time
LDAP-based AuthenticationStandard interface to external LDAP server/Microsoft
®
Active Directory Server
Integrated AAA ServerLocal database authentication based on WC7520 internal AAA Server
Guest AccessIntegrated captive portal available for client authentication in a security profile
Password based authentification mode: Local user store available, receptionist assigned user name/password
External Radius server mode: External RADIUS authentication for the captive portal clients
Open authentication mode: Guest auto registration with email address
Extraction of logs of guest activity
Captive PortalConfigurable portal page, including image files
Rogue Access PointsRogue AP definition: AP with radio SSID oberved by any of the managed APs and seen transmitting on same L2 wired network
Detection and mapping of up to 512 rogue APs
Monitoring SummarySummary of managed access points status, rogue access points detected, wireless stations connected, Wireless Controller information and wireless network usage
Managed Access PointsAP status for the managed access points and details that includes configuration settings, current wireless settings, current clients and detailed traffic statistics
Rogue Access PointsRogue access points reported
Rogue access points in same channel
Rogue access points in interfering channels
Wireless ClientsClients statistics and details per AP, per SSID, per floor, per location
Blacklisted clients, roaming clients
Wireless Network UsageNetwork usage statistics display plots of average received/transmitted network traffic per managed access point. Three different plots show Ethernet, Wireless 802.11 b/bg/ng and 802.11 a/na mode traffic separately
Heat MapsLive coverage and visualization heat maps
Location visualization and device tracking
Logging and ReportingIf available syslog server on the network, the Wireless Controller can send all logs. Logs are also available on the GUI and ready to download (log export file)
Email alerts for events as per configuration to multiple email addresses
DiagnosticsManaged access points ping
MaintenanceSave/restore configuration, restore to factory defaults, admin password change, add user (read-only), firmware upgrade via Web browser for the Wireless Controller and the managed access points
RFC - System FacilitiesRFC 1001 Protocol standard for a NetBIOS service on a TCP/UDP transport: Concepts and methods'
RFC 1002 Protocol standard for a NetBIOS service on a TCP/UDP transport: Detailed specifications
RFC 1155 Management information for TCP/IP networks
RFC 1305 Network Time Protocol (Version 3) Specification, Implementation and Analysis
RFC 2131 DHCP
RFC 3768 Virtual Router Redundancy Protocol (VRRP)
RFC 768 UDP
RFC 791 IP
RFC 792 ICMP
RFC 793 TCP
RFC 826 ARP
RFC - Security and AAAWPA-PSK, WPA2-PSK
RFC 1321 MD5 Message – Digest Algorithm
RFC 1851 Triple DES Algorithm
RFC 2246 TLS Protocol Version 1.0
RFC 2404 HMAC-SHA-1-96
RFC 3280 Internet X.509 PKI Certificate and CRL certificate
RFC 3377 Lightweight Directory Access Protocol (v3): Technical Specification
RFC 3565 Use of the Advanced Encryption Standard (AES) Encryption Algorithm in Cryptographic Message Syntax
RFC 4346 TLS Protocol version 1.1