2
F
F
E
E
A
A
T
T
U
U
R
R
E
E
S
S
A
A
N
N
D
D
B
B
E
E
N
N
E
E
F
F
I
I
T
T
S
S
The access point has been designed for high performance and offers a rich
suite of features, with which you should acquaint yourself to be able to exploit
your access point’s full potential.
x
x
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
D
D
i
i
s
s
t
t
r
r
i
i
b
b
u
u
t
t
i
i
o
o
n
n
S
S
y
y
s
s
t
t
e
e
m
m
(
(
W
W
D
D
S
S
)
)
This feature allows linking of several access points, virtually creating a larger
network infrastructure that allows mobile users to roam wirelessly, while still
being able to access network resources.
x
x
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
P
P
s
s
e
e
u
u
d
d
o
o
V
V
L
L
A
A
N
N
The unique Wireless Pseudo VLAN technology is a feature that allows wireless
clients to be segmented individually or into workgroups, thus blocking
access to another user’s/group’s PCs, and enhancing the privacy of the
wireless clients. This is especially useful in public hotspot deployment.
x
x
H
H
i
i
g
g
h
h
l
l
y
y
S
S
e
e
c
c
u
u
r
r
e
e
d
d
W
W
i
i
r
r
e
e
l
l
e
e
s
s
s
s
N
N
e
e
t
t
w
w
o
o
r
r
k
k
The access point supports the highest available wireless security standard:
Wi-Fi Protected Access 2. WPA2 has two different modes: WPA2-Personal for
SOHO users and WPA2-Enterprise for Enterprise users. The access point also
supports IEEE 802.1x for secure and centralized user-based authentication.
Wireless clients are thus required to authenticate through highly secure
methods like EAP-TLS, EAP-TTLS, and EAP-PEAP, in order to obtain access to
the network.
x
x
S
S
m
m
a
a
r
r
t
t
S
S
e
e
l
l
e
e
c
c
t
t
This feature will automatically scan and recommend the best channel that
the access point can utilize.
x
x
u
u
C
C
o
o
n
n
f
f
i
i
g
g
U
U
t
t
i
i
l
l
i
i
t
t
y
y
The exclusive uConfig utility allows users to access the user-friendly Web
configuration interface of the access point without having to change the
TCP/IP setup of the workstation.
x
x
S
S
T
T
P
P
Spanning-Tree Protocol provides path redundancy while preventing
undesirable loops in the network. It forces certain redundant data paths into
a standby (blocked) state. If one network segment in the Spanning-Tree
Protocol becomes unreachable, or if Spanning-Tree Protocol costs change,
the spanning-tree algorithm reconfigures the spanning-tree topology and
re-establishes the link by activating the standby path.