Datasheet

3
•IEEE802.1xauthenticationandRADIUSlogin
Authenticatewirelessclientsbasedon802.1xprotocolusingRADIUSserver
•DoSprevention
DetectsandblockscommonlyusedDoSattacksthatcanbeinitiatedonthedevices.Common
attacksignaturesarestoredinthedevice
•Applicationlevelgateway(SIP/H.323)
DiscoverstheIPaddressandserviceportinformationembeddedintheapplicationdata
usingdeeppacketinspectionintherewall;rewallthendynamicallyopensappropriate
connectionsforspecicapplications
•Securemanagement
MAC/IPbasedadministratorauthentication,secureWAN/LANaccesstomanagement
interface,encryptmanagementtracusingHTTPS
•HTTPSmanagement
ProvidessecureWebmanagement
•Managementpassword
ProvidessecuritysothatonlyauthorizedaccesstotheWebbrowserinterfaceisallowed
Virtual private network (VPN)
•IPsec
ProvidessecuretunnelingoveranuntrustednetworksuchastheInternetorawireless
network;oersdatacondentiality,authenticity,andintegritybetweentwonetwork
endpoints
•Layer2TunnelingProtocol(L2TP)
Anindustrystandard-basedtracencapsulationmechanismsupportedbymanycommon
OSs;willtunnelthepoint-to-pointProtocol(PPP)tracovertheIPandnon-IPnetworks;may
usetheIP/UDPtransportmechanisminIPnetworks
•NetworkAddressTranslation-Traversal(NAT-T)
EnablesIPsec-protectedIPdatagramstopassthroughanetworkaddresstranslator(NAT)
•Point-to-PointTunnelingProtocol
Anindustrystandard-basedtracencapsulationmechanismforVPNtunnelssupportedby
manycommonOSs;PPTPusesacontrolchanneloverTCPandaGREtunneloperatingto
encapsulatePPPpackets
Datasheet|HPPS110WirelessVPNRouterSeries