S500 Dual Band

S500 Dual Band S500 Dual Band S500 Dual Band S500 Dual Band

Product Features
1. Support 802.11ac, dual band--2.4GHz、5.8GHz
2. Internal matrix smart antenna, Max access rate--1166Mbps
3. Gigabit port for uplink, power supply: PoE or external power adapter, power consumption<13W
4. Output power≤20dbm, adjustable for customization
Application Scenarios
Applied for indoor situation; Installation: mounting on the ceiling, hanging on the wall, placing on the table.
Software Specifications
Product Specifications of SUNDRAY AP-3600
Hardware specifications
Item     Description
Model     S500
Weight     N/A
Dimensions (excluding antenna interfaces and accessories)     196 mm x 196 mm x 45 mm
Ethernet port     1*10/100/1000 Mbps
Console port     1 RJ45 port
PoE     802.3af/802.3at power supply supported
Local power supply     12 V/1.5 A
Transmit power     ≤ 20 dBm
Power adjustment granularity     1 dBm
Power range     1 dBm to the value specified by national regulations
Power consumption     < 13 W
Antenna     Embedded intelligent antenna matrix
Reset/restore factory settings     Supported
Status indicator     1 status indicator
Operating/storage temperature     -10ºC to +55ºC or -40ºC to +70ºC
Operating/storage humidity     5%-95% (non-condensing)
Protection level     IP 41
MTBF     > 250000 H
RF
Streams:
2
Maximum transmission speed of a single frequency:
2.4 G: 300 Mbps
5 G: 866 Mbps
Operating frequency band:
802.11ac/n/a: 5.725-5.850 GHz, 5.15-5.35 GHz (China)
802.11b/g/n: 2.4-2.483GHz (China)
Modulation technology:
OFDM: BPSK@6/9 Mbps, QPSK@12/18 Mbps, 16-QAM@24 Mbps, 64-QAM@48/54 Mbps
DSSS: DBPSK@1 Mbps, DQPSK@2 Mbps, CCK@5.5/11 Mbps
MIMO-OFDM: MCS 0-15
MIMO-OFDM (11ac): MCS 0-9
Channel rate:
802.11b: 1, 2, 5.5, 11
802.11a/g: 6, 9, 12, 18, 24, 36, 48, 54
802.11n: 6.5 to 300 (MCS0 to MCS15)
802.11n high throughput support: MCS 0-7 HT 20/40
802.11ac: MCS 0-9, 20/40/80
Channel Quality:
802.11a, 802.11n, 802.11ac (compatible with 802.11a): 5 channels
802.11b, 802.11g, 802.11n (compatible with 802.11b/g mode): 13 channels
Manual and automatic channel adjustment:
Supported
Automatic power adjustment:
Supported
Manual power adjustment:
The AP supports manual power adjustment with an adjustment granularity of 1 dBm. The power scope is from 1 dBm to the value specified by national regulations.
Timed turning on or off of RF:
RF can be turned on or off based on the specified time period.
Coverage black hole detection and compensation:
Supported
WLAN function
Maximum number of connected users:
256 (maximum number of connected users of a single RF: 128)
Connected user quantity restriction:
Supported
Virtual AP:
32
Chinese SSID:
Supported
SSID hiding:
Supported
Wireless relay/bridge:
Point-to-point and point-to-multipoint supported
User- and traffic-based intelligent load balancing:
Supported
Bandwidth restriction:
STA-, SSID-, or AP-based rate limiting is supported.
STA function:
Abnormal STA disconnection detection, STA aging detection, and STA statistic and status query are supported.
Link integrity detection:
Supported
Security authentication
Authentication mode:
Pre-shared key authentication, portal authentication, 802.1x authentication, CA certificate authentication, WeChat authentication, SMS authentication, QR code authentication, temporary visitor authentication, and authentication exemption are supported.
Pre-shared key:
WPA-PSK, WPA2-PSK, WPA-PSK/WPA2-PSK hybrid authentication
Portal authentication:
Intelligent terminal type identification is supported. A page matching the terminal size is pushed to terminals. The page logo and displayed information can be customized. In addition, the verification, authentication interval, and reconnection authentication time thresholds can be set.
802.1x authentication:
802.1x one-key configuration and 802.1x perception-free authentication are supported. You only need to download the one-key automatic configuration tool at initial access and finish wireless network configuration quickly. This simplified network deployment significantly.
CA certificate authentication:
High-security certificate authentication can be implemented by using the CA certificate issuance center embedded into the controller, without the need to constructing a certificate server. Authentication by using a certificate imported from an external certificate server is also supported.
WeChat authentication:
After access the wireless network, a user can scan the QR code of the shopping mall or enterprise and follow the public account to access the Internet. The one-key follow function can be easily deployed without any code development. In WeChat authentication, a user can access the network by clicking a text message network access link or clicking the menu bar to view advertisements, or access the network via WeChat authorization.
SMS authentication:
SMS authentication takes effect forever. That is, a user can directly access the network without authentication after being authenticated via SMS at initial access. This reduces the SMS costs and improves user experience.
QR code authentication:
After a visitor terminal accesses the wireless network, the terminal will automatically display a QR page. The approver scans the QR code of the visitor terminal via a cell phone and then the visitor can access the Internet. The visitor information is recorded in three dimensions: approver, remarks, and MAC address of the visitor terminal. This ensures user traceability and network security.
Temporary visitor authentication:
A temporary user information management system is embedded. A temporary user can log in within the validity period and cannot after the validity period elapses. A secondary permission system for temporary account management is embedded and temporary accounts can be created and managed in this system. The QR code of a temporary visitor can be printed and the temporary visitor can scan the QR code to access the network. Temporary visitors can be grouped.
Authentication exemption:
Only a portal advertisement page is displayed. A user needs to click the login button to access the network without entering any account password or performing other authentication.
Data encryption:
Data encryption via TKIP and AES (CCMP) is supported.
Blacklist and whitelist:
Static whitelist and blacklist are supported.
User isolation:
SSID-based isolation, automatic VLAN grouping, and user isolation of specified VLANs are supported.
WIDS/WIPS:
Supported
Illegitimate AP detection and workaround:
Supported
ACL:
Account-, access location-, access terminal type- and SSID-based ACL policy assignment and management are supported.
Radius protocol:
Supported
Wireless optimization
Application layer acceleration:
Acceleration can be performed for the application layer. The acceleration service application can help increase the transmission speed by 1.5 to 4 times.
E-schoolbag scenario optimization:
The transmission speed of multicast packets is increased, improving the effects of the E-schoolbag scenario in an all-round way.
Intelligent broadcast acceleration:
The transmission speed of broadcast packets is automatically increased based on the actual environment, thereby improving the transmission efficiency of broadcast packets.
Terminal dragging prevention:
This function aims to prevent the decrease of the entire network speed caused by low-speed terminals based on the time fairness algorithm.
Terminal viscosity prevention:
This function involves detecting STAs connected to APs and intelligently guiding the STAs to the optimal AP.
Prohibited access of low-speed terminals:
The speed of access terminals is limited. Weak-signal terminals with a speed lower than the specified value are prohibited from accessing the network. This improves the entire network speed.
High-density access scenario optimization:
The response to broadcast probe requests is controlled for the purpose of optimizing high-density access scenarios.
ARP-unicast conversion:
ARP broadcast packets are converted into unicast packets. This reduces the number of broadcast packets, thereby improving the transmission speed.
Prohibited DHCP requests destined for wireless terminals:
After this function is enabled, DHCP broadcast requests will be forwarded only to the wired network, instead of other wireless network. This improves the network throughput and performance of the wireless network.
Hotspot analysis
AP-based access user quantity statistics:
The number of connected users and change trends of each AP in the recent one day, one week, and one month can be measured.
AP-based network access traffic statistics:
The network access traffic and change trends of each AP in the recent one day, one week, and one month can be measured.
AP-based signal quality analysis :
Statistic analysis for the signal usage, noise, retransmit rate, BER, and BER change trends of each AP is supported.
AP access mode
AC discovery mechanism:
L2 broadcast automatic discovery
L3 discovery based on configured static IP addresses
DHCP Option43 discovery
DNS domain name discovery
Cross-WAN and cross-NAT remote AP deployment:
Supported
Web agent:
Controller IP addresses can be dynamically discovered by using the webAgent technology. This avoids AP disconnection caused by unfixed controller IP addresses.
Tunnel encryption:
Supported
L3 Function
NAT:
Supported
Network access mode:
PPPoE dial-up and static IP address
DHCP server:
Supported
DNS Proxy:
Supported
Relay bridge
Relay Mode:
Point-to-point and point-to-multipoint supported.
Relay frequency band:
2.4/5.8 GHz
Disable wireless network on relay frequency band:
Supported
Wireless backhaul service:
Supported