Cisco Cisco Aironet 702W Access Point 数据表
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 6 of 6
Item
Specification
● EAP Type(s):
◦ Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
◦ EAP-Tunneled TLS (TTLS) or Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2)
◦ Protected EAP (PEAP) v0 or EAP-MSCHAPv2
◦ Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
◦ PEAPv1 or EAP-Generic Token Card (GTC)
◦ EAP-Subscriber Identity Module (SIM)
◦ EAP-Tunneled TLS (TTLS) or Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2)
◦ Protected EAP (PEAP) v0 or EAP-MSCHAPv2
◦ Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
◦ PEAPv1 or EAP-Generic Token Card (GTC)
◦ EAP-Subscriber Identity Module (SIM)
● Multimedia:
◦ Wi-Fi Multimedia (WMM
™
)
● Other:
◦ FCC Bulletin OET-65C
◦ RSS-102
◦ RSS-102
Limited Lifetime Hardware Warranty
The Cisco Aironet 700W Series Access Point comes with a Limited Lifetime Warranty that provides full warranty
coverage of the hardware for as long as the original end user continues to own or use the product. The warranty
includes 10-day advance hardware replacement and ensures that software media is defect-free for 90 days. For
Cisco Wireless LAN Services
Realize the full business value of your technology investments faster with intelligent, customized services from
Cisco and our partners. Backed by deep networking expertise and a broad ecosystem of partners, Cisco Wireless
LAN Services enable you to deploy a sound, scalable mobility network that enables rich media collaboration while
improving the operational efficiency gained from a converged wired and wireless network infrastructure based on
the Cisco Unified Wireless Network. Together with partners, we offer expert plan, build, and run services to
accelerate your transition to advanced mobility services while continuously optimizing the performance, reliability,
and security of that architecture after it is deployed. For more details, visit:
Printed in USA
C78-728968-01 04/14