Item added to your cart
Cyber Nexus
Use this text to display some key features of the products
Standards: IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u, IEEE 802.3af (PoE), 802.1p (QoS
priority), 802.1q (VLAN), 802.1X (security authentication), 802.11i ready (security WPA2),
802.11e ready (wireless QoS), 802.11F (wireless roaming)
Ports: 10BASE-T/100BASE-TX Ethernet, 12V DC power
Buttons: Reset
Cabling type: Unshielded twisted pair (UTP) Category 5
LEDs: Power, PoE, Wireless, Ethernet
Operating system: Linux
Web user interface: Built-in web user interface for easy browser-based configuration (HTTP/HTTPS)
SNMP version: SNMP version 1, 2c, 3
Event logging: Email notification Remote syslog
Web firmware upgrade: Firmware upgradable through web browser
Diagnostics: Flash, RAM, LAN, WLAN
Dynamic Host Configuration
Protocol (DHCP): DHCP client
Access point: Access point mode, point-to-point bridge mode, point-to-multipoint bridge mode, repeater mode
Spec/modulation: Radio and modulation type: 802.11b/DSSS, 802.11g/OFDM
Channels: Operating channels: 11 North America, 13 most of Europe (ETSI and Japan)
External antennas 2 (omnidirectional) SMA detachable
Transmit power: Transmit power (adjustable) at normal temperature range:
● 802.11b: 18~19 dBm
● 802.11g: 14~15 dBm
Antenna gain in dBi: 2
Receiver sensitivity: 802.11.g: 54 Mbps at -72 dBm, 802.11.b: 11 Mbps at -85 dBm
WEP/WPA/WPA2: WEP 64-bit/128-bit, WPA-PSK, WPA2-PSK, WPA-ENT, WPA2-ENT
Access control: Wireless connection control: MAC-based
SSID broadcast: SSID broadcast enable/disable
802.1X: IEEE 802.1X support
Wireless client isolation: Wireless client devices can be isolated from each other either within an SSID or between 2 SSIDs
Wireless Security Monitor: Scan and classify wireless devices in the network
Report new client and access point joining network and suspicious network events (works together with Cisco WUSB 200, WMP200 or WPC200 business client adapters):
● Intrusion alarms (e.g., rogue client detected, spoofed MAC address)
● Denial-of-service alarms (e.g., duration attack, association table full)
● Vulnerability alarms (e.g., access point is not using encryption, access point is broadcasting SSID)
● Other alarms (e.g., low speed connection)
Use this text to display some key features of the products