Cyber Nexus

Cisco WAP200 Wireless-G Access Point with RangeBooster

Sale price 165,000 ₮

Standards: IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u, IEEE 802.3af (PoE), 802.1p (QoS 
priority), 802.1q (VLAN), 802.1X (security authentication), 802.11i ready (security WPA2), 
802.11e ready (wireless QoS), 802.11F (wireless roaming) 
Ports: 10BASE-T/100BASE-TX Ethernet, 12V DC power 
Buttons: Reset 
Cabling type: Unshielded twisted pair (UTP) Category 5 
LEDs: Power, PoE, Wireless, Ethernet 
Operating system: Linux 
Web user interface: Built-in web user interface for easy browser-based configuration (HTTP/HTTPS) 
SNMP version: SNMP version 1, 2c, 3 
Event logging:  Email notification Remote syslog 
Web firmware upgrade: Firmware upgradable through web browser 
Diagnostics: Flash, RAM, LAN, WLAN 
Dynamic Host Configuration 
Protocol (DHCP): DHCP client 
Access point: Access point mode, point-to-point bridge mode, point-to-multipoint bridge mode, repeater mode 
Spec/modulation: Radio and modulation type: 802.11b/DSSS, 802.11g/OFDM 
Channels: Operating channels: 11 North America, 13 most of Europe (ETSI and Japan) 
External antennas 2 (omnidirectional) SMA detachable 
Transmit power: Transmit power (adjustable) at normal temperature range: 
● 802.11b: 18~19 dBm 
● 802.11g: 14~15 dBm 
Antenna gain in dBi:
Receiver sensitivity: 802.11.g: 54 Mbps at -72 dBm, 802.11.b: 11 Mbps at -85 dBm 
WEP/WPA/WPA2: WEP 64-bit/128-bit, WPA-PSK, WPA2-PSK, WPA-ENT, WPA2-ENT 
Access control: Wireless connection control: MAC-based 
SSID broadcast: SSID broadcast enable/disable 
802.1X: IEEE 802.1X support 
Wireless client isolation: Wireless client devices can be isolated from each other either within an SSID or between 2 SSIDs 
Wireless Security Monitor: Scan and classify wireless devices in the network 
Report new client and access point joining network and suspicious network events (works together with Cisco WUSB 200, WMP200 or WPC200 business client adapters): 
● Intrusion alarms (e.g., rogue client detected, spoofed MAC address) 
● Denial-of-service alarms (e.g., duration attack, association table full) 
● Vulnerability alarms (e.g., access point is not using encryption, access point is broadcasting SSID) 
● Other alarms (e.g., low speed connection) 

Use this text to display some key features of the products

Link copied