Cisco Cisco WAP371 Wireless-AC N Access Point with Single Point Setup 데이터 시트

다운로드
페이지 16
 
 
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 3 of 16 
● 
The Cisco FindIT utility, which works through a simple toolbar on the user’s web browser, discovers Cisco 
devices in the network and displays basic information, such as serial numbers and IP addresses, to aid in 
configuration and deployment. (For more information and to download this free utility, visit 
.) 
High Reliability and Resiliency 
In a growing business where availability 24 hours a day, 7 days a week is critical, you need to assure that 
employees can always access the data and resources they need. The Cisco 350 Series supports dual images, 
allowing you to perform software upgrades without having to take the network offline or worry about the network 
going down during the upgrade. 
Strong Security 
Cisco 350 Series switches provide the advanced security features you need to protect your business data and 
keep unauthorized users off the network: 
● 
Embedded Secure Sockets Layer (SSL) encryption protects management data traveling to and from the 
switch. 
● 
Extensive access control lists (ACLs) restrict sensitive portions of the network to keep out unauthorized 
users and guard against network attacks. 
● 
Guest VLANs let you provide Internet connectivity to nonemployee users while isolating critical business 
services from guest traffic. 
● 
Support for advanced network security applications such as IEEE 802.1X port security tightly limits access 
to specific segments of your network. Web-based authentication provides a consistent interface to 
authenticate all types of host devices and operating systems, without the complexity of deploying IEEE 
802.1X clients on each endpoint. 
● 
Advanced defense mechanisms, including dynamic Address Resolution Protocol (ARP) inspection, IP 
Source Guard, and Dynamic Host Configuration Protocol (DHCP) snooping, detect and block deliberate 
network attacks. Combinations of these protocols are also referred to as IP-MAC port binding (IPMB). 
● 
IPv6 First Hop Security extends the advanced threat protection to IPv6. This comprehensive security suite 
includes ND inspection, RA guard, DHCPv6 guard, and neighbor binding integrity check, providing 
unparalleled protection against a vast range of address spoofing and man-in-the-middle attacks on 
IPv6 networks. 
● 
Time-based ACLs and port operation restrict access to the network during predesignated times such as 
business hours. 
● 
Uniform MAC address-based security can be applied automatically to mobile users as they roam between 
wireless access points. 
● 
Secure Core Technology (SCT) helps ensure that the switch is able to process management traffic in the 
face of a denial-of-service (DoS) attack. 
● 
Private VLAN Edge (PVE) provides Layer 2 isolation between devices on the same VLAN. 
● 
Storm control can be applied to broadcast, multicast, and unknown unicast traffic. 
● 
Protection of management sessions occurs using RADIUS, TACACS+, and local database authentication 
as well as secure management sessions over SSL, SSH, and SNMPv3. 
● 
DoS attack prevention maximizes network uptime in the presence of an attack.