HP ProCurve Access Control Server 745wl J9038A 产品宣传页

产品代码
J9038A
下载
页码 8
2
ProCurve Access Control Server 745wl
Features and benefits
Policy management
• Identity-driven network access control and
management: enables network administrators
to easily create and maintain robust access
policies, including secure wireless guest access
to appropriate network services, without risk
to the network
• Precise control over who has access to what
and when: centrally managed access policies
combined with edge-enforced packet
inspection allow or deny user access to specific
network services at the edge of the network,
including services such as Internet or intranet
Web access, FTP, telnet, specialized application
servers, or any network element that can be
identified by port and IP address
• Built-in RADIUS server: can perform
authentication services or act as a proxy server
for a remote RADIUS authentication service;
active authentication services now enable user
authentication and granular access control of
user traffic on wireless LANs secured by IEEE
802.11i or WPA
• Standards-based authentication support for
LDAP, Active Directory, and IEEE 802.1X:
seamlessly integrates into existing
authentication services or uses the built-in
database
• Misconfigured service management and
proxy redirection: allow secure, transparent
login for guests or users who have changed
their client network configurations
Resiliency and high availability
• Access Control Server redundancy and
failover: offers high network availability for
mission-critical mobile LAN deployments; in
the event the primary ProCurve Access Control
Server 745wl should fail or become
unreachable, a secondary Access Control Server
745wl immediately steps in and takes over the
management of Switch xl Access Controller
Modules to help ensure uninterrupted mobile
LAN access
• Roaming across subnets: helps ensure that
users maintain persistent connectivity to the
network and applications
Security
• Wireless data privacy: IPSec, PPTP, L2TP/IPSec,
or SSH tunnels are used to encrypt wireless
traffic with DES, 3DES, Blowfish, CAST, or AES,
providing the utmost in wireless data privacy.
• Client VPN sessions: are terminated using
non-proprietary, built-in VPN clients of
Microsoft® Windows® and Apple Macintosh
operating systems and third-party VPN clients
• Secure Sockets Layer (SSLv3): encrypts all HTTP
traffic over browser-based connections
• Anti-MAC-address spoofing: prevents
untrusted users from gaining access by
spoofing a trusted user's MAC address