NWC-7028
NWC-7028 is a new generation of high-performance 10G intelligent wireless controller. It can be used as a wireless controller and layer 3 core switch at the same time. It offers 24 GE ports, 2 combo (GbE/SFP) ports and 2 10G SFP+ ports. It can manage up to 256 wireless access points (APs) and is suitable for small and medium-sized wireless network.
Products Specification
Hardware Specifications
Item | NWC-7028 | |
Basic Parameter | Max QTY of managed AP | 256 |
Default QTY of managed AP | 16 | |
AP License upgrade step | 16,32,128 | |
Max con-current users | 5K(no user authentication), 1K(with user authentication) | |
Switch capacity | 128Gbps | |
Forwarding rate | 95Mpps | |
VLAN | 4K | |
ACL | 3K | |
MAC | 16K | |
ARP | 4K | |
Physical Parameter | Interface | 24 x 10/100/1000Base-T Ethernet ports |
2 x combo (GbE/SFP) Ethernet ports | ||
2 x 10G SFP+ Ethernet ports | ||
Management interface | 1 x Console (RJ-45) 1 x 10/100/1000BASE-T MGMT 1 x USB 2.0 | |
Dimension(L*W*H) | 440mm*240mm*44mm, 1U | |
Power Parameter | Consumption | <25W |
Power input | AC 110V – 240V, 50-60Hz (+/- 3Hz) | |
Environmental Parameter | Working temperature | 0℃~55℃ |
Storage temperature | -40℃~70℃ | |
Working humidity | 5%~90% non-condensing |
Software Specifications
Item | NWC-7028 |
L2 protocols and standards | IEEE802.3(10Base-T)、IEEE802.3u(100Base-TX)、IEEE802.3z(1000BASE-X)IEEE802.3ab(1000Base-T)、IEEE802.3ae(10GBase-T) IEEE802.3ak(10GBASE-CX4)、IEEE802.1Q(VLAN) IEEEE802.1d(STP)、IEEEE802.1W(RSTP)、IEEEE802.1S(MSTP) IEEE802.1p(COS) IEEE802.1x(Port Control)、IEEE802.3x(flow control) IEEE802.3ad(LACP)、Port Mirror IGMP Snooping、MLD Snooping QinQ、GVRP,PVLAN Broadcast control |
L3 protocols and standards | Static Routing RIPv1/v2, OSPF, BGP, VRRP, IGMP v1/v2/v3 ARP, ARP Proxy Static Multicast Route |
Wireless protocols and standards | 802.11, 802.11a, 802.11b,802.11g,802.11n,802.11d,802.11h,802.11i, 802.11e, 802.11k |
CAPWAP protocol | Supports L2/L3 network topology between an AP and an AC. |
Enables an AP to automatically discover an accessible AC. | |
Enables an AP to automatically upgrade its software version from an AC. | |
Enables an AP to automatically download configurations from an AC. | |
IPv6 protocols and standards | 6to4 Tunnel, Configured Tunnel, ISATAP Tunnel, GRE Tunnel ICMPv6, ND, DNSv6 IPv6 LPM Routing, IPv6 Policy-based Routing (PBR) IPv6 VRRPv3, IPv6 URPF, IPv6 RA RIPng, OSPFv3, BGP4+ MLD Snooping, IPv6 Multicast VLAN MLDv1/v2, IPv6 ACL, IPv6 QoS |
High reliability | N+1 backup |
N+N backup | |
RF management | Setting country codes |
Manually/automatically setting the transmit power | |
Manually/automatically setting the working channel | |
Automatically adjusting the transmission rate | |
Blind area detection and repair | |
RF environment scanning, which enables a working AP to scan the surrounding RF environment | |
RF interference detection and avoidance | |
11n-preferred RF policy | |
SSID hiding | |
20 MHz and 40 MHz channel bandwidth configuration | |
Airtime protection in hybrid access of 11bg and 11n terminals | |
Terminal-based airtime fairness scheduling | |
Terminal locating (A terminal locating algorithm can be embedded in the AC) | |
Spectral navigation (5 GHz preferred) | |
11n only | |
SSID-based or Radio-based limit on the number of users | |
User online detection | |
Automatic aging of traffic-free users | |
Prohibiting the access of clients with weak signals | |
Remote probe analysis | |
Security | 64/128 WEP, dynamic WEP, TKIP, CCMP, and SMS encryption |
802.11i security authentication and two modes (Enterprise and Personal) of 802.1x and PSK | |
WAPI encryption and authentication | |
LDAP authentication | |
MAC address authentication | |
Portal authentication, including built-in portal, external portal, and custom portal authentication modes | |
PEAP user authentication | |
Forwarding security control, such as frame filtering, white list, static blacklist, and dynamic blacklist | |
User isolation | |
Periodic Radio/SSID enabling and disabling | |
Access control of free resources | |
Secure admission control of wireless terminals | |
Access control of various data packets such as MAC, IPv4, and IPv6 packets | |
Secure access control of APs, such as MAC authentication, password authentication, or digital certificate authentication between an AP and an AC | |
Radius Client | |
Backup authentication server | |
Wireless SAVI | |
User access control based on AP locations | |
Wireless intrusion detection system (WIDS) and wireless intrusion prevention system (WIPS) | |
Protection against flooding attacks | |
Protection against spoofing attacks | |
Forwarding | IPv6 access and forwarding; constructing IPv6 WLAN access service on an IPv4 network; providing IPv4 WLAN access service on an IPv6 network; and constructing private IPv6 WLAN network service on an IPv6 network |
Fast L2/L3 roaming between APs served by the same AC | |
IPv4 and IPv6 multicast forwarding | |
WDS AP | |
QoS | 802.11e (WMM); and 4-level priority queues, ensuring that applications sensitive to the real-time effect, such as voice and video services, are transmitted first |
Ethernet port 802.1P identification and marking Mapping from wireless priorities to wired priorities | |
Mapping of different SSIDs/VLANs to different QoS policies Mapping of data streams that match with different packet fields to different QoS policies | |
Access control of MAC, IPv4, and IPv6 data packets | |
Load balancing based on the number of users Load balancing based on user traffic Load balancing based on frequency bands | |
Bandwidth limit based on APs Bandwidth limit based on SSIDs Bandwidth limit based on terminals Bandwidth limit based on specific data streams | |
Power saving mode | |
Multicast-to-unicast mechanism | |
Automatic emergency mechanism of APs | |
Intelligent identification of terminals | |
Management | Web management |
Configuration through a console port | |
SNMP v1/v2c/v3 | |
Both local and remote maintenance | |
Local logs, Syslog, and log file export | |
Alarm | |
Fault detection | |
Statistics | |
Login through Telnet | |
Login through SSH | |
Dual-image (dual-OS) backup | |
Hardware watchdog | |
AC cluster management; automatic information synchronization between ACs in a cluster, and automatic or manual push of configuration information | |
SSID-based user permission management mechanism |